General

  • Target

    ec06ecab6fce009d2d488fc5b408bf61955432b17e69e0bc8970d53f3850fa93

  • Size

    5.3MB

  • Sample

    240702-j8lkmstfmh

  • MD5

    7aeb133be519c3d600de76d41a6d7eed

  • SHA1

    ee655f5621a81129584a97dbfc24198634244798

  • SHA256

    ec06ecab6fce009d2d488fc5b408bf61955432b17e69e0bc8970d53f3850fa93

  • SHA512

    9cd93149367cceab1baf75eab7b7166e125534ad97921a77b4422ea36330dd2bff681c1a42c000aa1f25efe3588d7a37763de96d59ffc4349eb2c56c06370ac2

  • SSDEEP

    98304:CD27kA9IK7nVk+boP2N7P22KnXfSB0+moWQxJ30KwRpUW3+CI8vpVkoHQxS:f7ki7Vk+bo877efu0+x5KUmI0pVkoHQ0

Malware Config

Targets

    • Target

      ec06ecab6fce009d2d488fc5b408bf61955432b17e69e0bc8970d53f3850fa93

    • Size

      5.3MB

    • MD5

      7aeb133be519c3d600de76d41a6d7eed

    • SHA1

      ee655f5621a81129584a97dbfc24198634244798

    • SHA256

      ec06ecab6fce009d2d488fc5b408bf61955432b17e69e0bc8970d53f3850fa93

    • SHA512

      9cd93149367cceab1baf75eab7b7166e125534ad97921a77b4422ea36330dd2bff681c1a42c000aa1f25efe3588d7a37763de96d59ffc4349eb2c56c06370ac2

    • SSDEEP

      98304:CD27kA9IK7nVk+boP2N7P22KnXfSB0+moWQxJ30KwRpUW3+CI8vpVkoHQxS:f7ki7Vk+bo877efu0+x5KUmI0pVkoHQ0

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks