General

  • Target

    4783a7d327acb7eecb81d4d12d6c613d82ca759f23ba8b605f920b00b0ed4e33

  • Size

    5.3MB

  • Sample

    240702-lfrx3awdlb

  • MD5

    0f5526ecee9020eb8cb4b38ab8962968

  • SHA1

    be15a920d82d5c90810190d1b83ceb692c5e50a2

  • SHA256

    4783a7d327acb7eecb81d4d12d6c613d82ca759f23ba8b605f920b00b0ed4e33

  • SHA512

    16cd227cfd716dd79396b2e063e615cdc461302891537500c30fcca3a36e9f0197f8f79862688b0649de17be0dc9915982fc8409cf8f46a02abc82b573fba3c0

  • SSDEEP

    98304:C5cDwdMKeFV5rmrEBUq7EauMOU7e4B3M7jpazNZRH49JGwSx0F1cQHFbQxS:bwdMKeFVUS7uMOtkejpKMeCFbQ0

Malware Config

Targets

    • Target

      4783a7d327acb7eecb81d4d12d6c613d82ca759f23ba8b605f920b00b0ed4e33

    • Size

      5.3MB

    • MD5

      0f5526ecee9020eb8cb4b38ab8962968

    • SHA1

      be15a920d82d5c90810190d1b83ceb692c5e50a2

    • SHA256

      4783a7d327acb7eecb81d4d12d6c613d82ca759f23ba8b605f920b00b0ed4e33

    • SHA512

      16cd227cfd716dd79396b2e063e615cdc461302891537500c30fcca3a36e9f0197f8f79862688b0649de17be0dc9915982fc8409cf8f46a02abc82b573fba3c0

    • SSDEEP

      98304:C5cDwdMKeFV5rmrEBUq7EauMOU7e4B3M7jpazNZRH49JGwSx0F1cQHFbQxS:bwdMKeFVUS7uMOtkejpKMeCFbQ0

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks