General

  • Target

    12ec5e3268601d25e986305ed5b1caddf7e9024abb89c7a01f8113ec09795ddb

  • Size

    5.3MB

  • Sample

    240702-yj2b5azerl

  • MD5

    cd605ab32fa5cb650d4a99c3afc82c97

  • SHA1

    2c28006f8cca1e6c68cef3d7c9518ace7ab9ab8c

  • SHA256

    12ec5e3268601d25e986305ed5b1caddf7e9024abb89c7a01f8113ec09795ddb

  • SHA512

    fe6c065eb87745f5265c8c06112bf36e23aa27d8ee578539dce30ac720a0a0e7b1e27a461bbb02a0f089be823f2afa024c470bcf25fc7765a0f3b71477825cd8

  • SSDEEP

    98304:CpdGErq6eSB1DOqEd4M36jb/h2Ik/N6gjFsWXnH5yTycb9CTmzRZbLQxla:0xqY1DFvM3qG//nH5u3b+mzPQva

Malware Config

Targets

    • Target

      12ec5e3268601d25e986305ed5b1caddf7e9024abb89c7a01f8113ec09795ddb

    • Size

      5.3MB

    • MD5

      cd605ab32fa5cb650d4a99c3afc82c97

    • SHA1

      2c28006f8cca1e6c68cef3d7c9518ace7ab9ab8c

    • SHA256

      12ec5e3268601d25e986305ed5b1caddf7e9024abb89c7a01f8113ec09795ddb

    • SHA512

      fe6c065eb87745f5265c8c06112bf36e23aa27d8ee578539dce30ac720a0a0e7b1e27a461bbb02a0f089be823f2afa024c470bcf25fc7765a0f3b71477825cd8

    • SSDEEP

      98304:CpdGErq6eSB1DOqEd4M36jb/h2Ik/N6gjFsWXnH5yTycb9CTmzRZbLQxla:0xqY1DFvM3qG//nH5u3b+mzPQva

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks