General

  • Target

    71ef5150cbd9a8fafaddb79cf913c0bba9a1f3062ab863e0cadb6089a79c3e61

  • Size

    5.1MB

  • Sample

    240702-bcn2wsthmr

  • MD5

    abd5a1a6fa41166b8b7b19b5bb30a1fb

  • SHA1

    fa4fb3d121825e598d7392f92031c5e11f50c065

  • SHA256

    71ef5150cbd9a8fafaddb79cf913c0bba9a1f3062ab863e0cadb6089a79c3e61

  • SHA512

    066d78d0d4b1ae9467e0aee501c7405b4eec509fe79174ca651f1011bbff47ed929315b2c35c9ff5f50e940473227f789b72cee17d4d502e44f6eb3802b0f69e

  • SSDEEP

    98304:CQAiEpOMArQ3H2aQ98mP6hyPr8+0C7yB/hrXHZmK5A/UA5FUnu8CX0YQQxy:5AiEpO/J86+yPr8+tA5rXcyvIMupxQQE

Malware Config

Targets

    • Target

      71ef5150cbd9a8fafaddb79cf913c0bba9a1f3062ab863e0cadb6089a79c3e61

    • Size

      5.1MB

    • MD5

      abd5a1a6fa41166b8b7b19b5bb30a1fb

    • SHA1

      fa4fb3d121825e598d7392f92031c5e11f50c065

    • SHA256

      71ef5150cbd9a8fafaddb79cf913c0bba9a1f3062ab863e0cadb6089a79c3e61

    • SHA512

      066d78d0d4b1ae9467e0aee501c7405b4eec509fe79174ca651f1011bbff47ed929315b2c35c9ff5f50e940473227f789b72cee17d4d502e44f6eb3802b0f69e

    • SSDEEP

      98304:CQAiEpOMArQ3H2aQ98mP6hyPr8+0C7yB/hrXHZmK5A/UA5FUnu8CX0YQQxy:5AiEpO/J86+yPr8+tA5rXcyvIMupxQQE

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks