General

  • Target

    a4568052f533615c117b11439c0b8d806f248b47a08576554adbfa1e05f69be9

  • Size

    5.1MB

  • Sample

    240702-chmaxswcmp

  • MD5

    77e5268c1e66250674a2c8c8706ec01d

  • SHA1

    b96abb2b205f47a7da0fcbdc2daa75fde4ccc679

  • SHA256

    a4568052f533615c117b11439c0b8d806f248b47a08576554adbfa1e05f69be9

  • SHA512

    d4b5a8312990fb5f1c66e40697a092471e14e22db5a45e43da8a1dfab71248d1fe732a727607eb5ccadcaaac30ccc6fb45b6d5a8cba75bda937ec18f28ae5772

  • SSDEEP

    98304:CIyvdSwjh5bOo7N6UnJ6BCElfDnIA+cFs7kbyQzBWxtNgwrFFQxy:R2jhNOUNwBZlrIHNGySupQE

Malware Config

Targets

    • Target

      a4568052f533615c117b11439c0b8d806f248b47a08576554adbfa1e05f69be9

    • Size

      5.1MB

    • MD5

      77e5268c1e66250674a2c8c8706ec01d

    • SHA1

      b96abb2b205f47a7da0fcbdc2daa75fde4ccc679

    • SHA256

      a4568052f533615c117b11439c0b8d806f248b47a08576554adbfa1e05f69be9

    • SHA512

      d4b5a8312990fb5f1c66e40697a092471e14e22db5a45e43da8a1dfab71248d1fe732a727607eb5ccadcaaac30ccc6fb45b6d5a8cba75bda937ec18f28ae5772

    • SSDEEP

      98304:CIyvdSwjh5bOo7N6UnJ6BCElfDnIA+cFs7kbyQzBWxtNgwrFFQxy:R2jhNOUNwBZlrIHNGySupQE

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks