General

  • Target

    5fa971710e366ecfe519963a3c9d5488d6a39e8139de94ec18a2571418e1b62c

  • Size

    5.2MB

  • Sample

    240702-przzlawgpr

  • MD5

    add6ad0109368f5c4c22303b6b9fa352

  • SHA1

    cdd82e3005e3c0e07d644b772f1057c386700071

  • SHA256

    5fa971710e366ecfe519963a3c9d5488d6a39e8139de94ec18a2571418e1b62c

  • SHA512

    c314be64ae950c7cf2e5ce2b4fa544d8eb1cbd102e962686330f7f1d5cd043a19856e63aaee9d1980e45fd2ac556b0d4ab10c290dc449460a28771968c7bfd28

  • SSDEEP

    98304:CtSPkYwwDJr6WQe5EAi+ITo01ktsQgLnyvD8yT5XeIkchYwWER6P8CIxM1PQx/:kSPkY1DJrLYstV3fTpeIrzHPCMM1PQx

Malware Config

Targets

    • Target

      5fa971710e366ecfe519963a3c9d5488d6a39e8139de94ec18a2571418e1b62c

    • Size

      5.2MB

    • MD5

      add6ad0109368f5c4c22303b6b9fa352

    • SHA1

      cdd82e3005e3c0e07d644b772f1057c386700071

    • SHA256

      5fa971710e366ecfe519963a3c9d5488d6a39e8139de94ec18a2571418e1b62c

    • SHA512

      c314be64ae950c7cf2e5ce2b4fa544d8eb1cbd102e962686330f7f1d5cd043a19856e63aaee9d1980e45fd2ac556b0d4ab10c290dc449460a28771968c7bfd28

    • SSDEEP

      98304:CtSPkYwwDJr6WQe5EAi+ITo01ktsQgLnyvD8yT5XeIkchYwWER6P8CIxM1PQx/:kSPkY1DJrLYstV3fTpeIrzHPCMM1PQx

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks