General

  • Target

    a22d69c1fab2e83dcd896b87c6d1e93d5a042edbb94f219d9da43afba5a1d535

  • Size

    5.3MB

  • Sample

    240702-qskfzaydml

  • MD5

    be3eba3801eb2804cf73258e6d19cd47

  • SHA1

    f822cec55c21da3c948dce6c8b279ed52f9a078f

  • SHA256

    a22d69c1fab2e83dcd896b87c6d1e93d5a042edbb94f219d9da43afba5a1d535

  • SHA512

    82172d11a7f0079431e69d08474660224f6249063b61acae11896db0111f45fa469ff45c59d019f7648b1db9e0e888e07593fdf5fbc30bad31dfbf7b0e5a25ec

  • SSDEEP

    98304:CrLxj0VkMj/KybVwtqgM+n8FAADW+z6FlS7f0yWRUJBzrp6saaorvAQx/:ALxj0Jj/KybCMq+WE6FoT0yWRCzV6t9p

Malware Config

Targets

    • Target

      a22d69c1fab2e83dcd896b87c6d1e93d5a042edbb94f219d9da43afba5a1d535

    • Size

      5.3MB

    • MD5

      be3eba3801eb2804cf73258e6d19cd47

    • SHA1

      f822cec55c21da3c948dce6c8b279ed52f9a078f

    • SHA256

      a22d69c1fab2e83dcd896b87c6d1e93d5a042edbb94f219d9da43afba5a1d535

    • SHA512

      82172d11a7f0079431e69d08474660224f6249063b61acae11896db0111f45fa469ff45c59d019f7648b1db9e0e888e07593fdf5fbc30bad31dfbf7b0e5a25ec

    • SSDEEP

      98304:CrLxj0VkMj/KybVwtqgM+n8FAADW+z6FlS7f0yWRUJBzrp6saaorvAQx/:ALxj0Jj/KybCMq+WE6FoT0yWRCzV6t9p

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks