General

  • Target

    1fba589a06b0b94be5206a534e67191e721d3f57b8c6f8ef71788e1ff6428137

  • Size

    5.3MB

  • Sample

    240703-bm9rcazcmg

  • MD5

    582a03c12a6d6c50618f8680652901dd

  • SHA1

    1f544de173d1cb6eecf97720525854ec99e31490

  • SHA256

    1fba589a06b0b94be5206a534e67191e721d3f57b8c6f8ef71788e1ff6428137

  • SHA512

    f9f2c86d18a59fbd4209b5acd76dab86f848db535dff468de204463128960eebcc427f112a0f54321eca4599af1a2938e04185ce90457a5e3682074c663f160f

  • SSDEEP

    98304:CeOUNbUa0oDbiFKw5o9oGA1ghAVI56Te8Wd8z/1ZGHIHYt5oFsbqsJDW4OQxla:POUUa0oDbiFKw+zsghAVxTeRCzzoiaon

Malware Config

Targets

    • Target

      1fba589a06b0b94be5206a534e67191e721d3f57b8c6f8ef71788e1ff6428137

    • Size

      5.3MB

    • MD5

      582a03c12a6d6c50618f8680652901dd

    • SHA1

      1f544de173d1cb6eecf97720525854ec99e31490

    • SHA256

      1fba589a06b0b94be5206a534e67191e721d3f57b8c6f8ef71788e1ff6428137

    • SHA512

      f9f2c86d18a59fbd4209b5acd76dab86f848db535dff468de204463128960eebcc427f112a0f54321eca4599af1a2938e04185ce90457a5e3682074c663f160f

    • SSDEEP

      98304:CeOUNbUa0oDbiFKw5o9oGA1ghAVI56Te8Wd8z/1ZGHIHYt5oFsbqsJDW4OQxla:POUUa0oDbiFKw+zsghAVxTeRCzzoiaon

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks