General

  • Target

    7a152a5b5799d3e53d27754ef609230378350f8683cb1e2f1d9eee965e50d07f

  • Size

    5.1MB

  • Sample

    240702-2y873athrh

  • MD5

    a338e26f564e2e42db650866b6484f20

  • SHA1

    7b915910b4b3b0df19e91ac66c3f8dcb8a0bc3d4

  • SHA256

    7a152a5b5799d3e53d27754ef609230378350f8683cb1e2f1d9eee965e50d07f

  • SHA512

    5391eec1bbf32e5213c47f3ed474b971722aae94ccc4a25d901e9222a20d2cb555deb2da270a795d324ae444f0697f3947d2c230ff0ce24df7985d838e35fd95

  • SSDEEP

    98304:C3+kLpvrHRBXaOXqMAg+8D2nEnWuLEdxyiYhfham7NZEZeQxla:4rXKOxATzsEdxujTEgQva

Malware Config

Targets

    • Target

      7a152a5b5799d3e53d27754ef609230378350f8683cb1e2f1d9eee965e50d07f

    • Size

      5.1MB

    • MD5

      a338e26f564e2e42db650866b6484f20

    • SHA1

      7b915910b4b3b0df19e91ac66c3f8dcb8a0bc3d4

    • SHA256

      7a152a5b5799d3e53d27754ef609230378350f8683cb1e2f1d9eee965e50d07f

    • SHA512

      5391eec1bbf32e5213c47f3ed474b971722aae94ccc4a25d901e9222a20d2cb555deb2da270a795d324ae444f0697f3947d2c230ff0ce24df7985d838e35fd95

    • SSDEEP

      98304:C3+kLpvrHRBXaOXqMAg+8D2nEnWuLEdxyiYhfham7NZEZeQxla:4rXKOxATzsEdxujTEgQva

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks