General

  • Target

    8fe0ab54ed3382caad4e5f503f9696a93072c0e8dc4ab3a37cb64d0126eb44ca

  • Size

    5.8MB

  • Sample

    240703-285mma1dqk

  • MD5

    de2e6ed061ebb3b6dda809e9062a4831

  • SHA1

    8f7892f021b7657d401a763949c8e4798234121d

  • SHA256

    8fe0ab54ed3382caad4e5f503f9696a93072c0e8dc4ab3a37cb64d0126eb44ca

  • SHA512

    3869596d18a50d53987bf18d504c77f803f92ee59af94cb4d2f588d8aba7c9506797ddb9e7eedcf6366bb7addacfffee35dd47193acce6a8dc52259ee5d4bf6f

  • SSDEEP

    98304:CbJlyXH2nWfHKDrMFe5N1aeVMbX01AIYtf5dVRMqsOMV66Jv9L+lvfgQmRrQx5Y:1mnWyDrM05NQjLfXVRMqs16i4lBmRrQ0

Malware Config

Targets

    • Target

      8fe0ab54ed3382caad4e5f503f9696a93072c0e8dc4ab3a37cb64d0126eb44ca

    • Size

      5.8MB

    • MD5

      de2e6ed061ebb3b6dda809e9062a4831

    • SHA1

      8f7892f021b7657d401a763949c8e4798234121d

    • SHA256

      8fe0ab54ed3382caad4e5f503f9696a93072c0e8dc4ab3a37cb64d0126eb44ca

    • SHA512

      3869596d18a50d53987bf18d504c77f803f92ee59af94cb4d2f588d8aba7c9506797ddb9e7eedcf6366bb7addacfffee35dd47193acce6a8dc52259ee5d4bf6f

    • SSDEEP

      98304:CbJlyXH2nWfHKDrMFe5N1aeVMbX01AIYtf5dVRMqsOMV66Jv9L+lvfgQmRrQx5Y:1mnWyDrM05NQjLfXVRMqs16i4lBmRrQ0

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks