General

  • Target

    f40cb027df0014cc058fc1f95a7bd7426f7cf3c99505f0ad4d3d7417f1018b74

  • Size

    5.2MB

  • Sample

    240703-ccwbmswaqn

  • MD5

    28bcb709862f3018c8d40fc53ee8bdca

  • SHA1

    89d41b64ff29a4923e97e47bc3ddac0fd046cc03

  • SHA256

    f40cb027df0014cc058fc1f95a7bd7426f7cf3c99505f0ad4d3d7417f1018b74

  • SHA512

    a89a90e7b8b101326cb1bd859d1e190a70cc56b4b72631f0894482ac6ea8e288f39c4e57347697025dfa8d2f90aff99a0a46c39fe6defcfc3a4626b0902039a0

  • SSDEEP

    98304:CliowwDuyUXXw3fkezmbMZh5uHoo3SoIbRL91Pdqes3OQLnQxla:i5wwzUXazmbM/873gN91P2Qva

Malware Config

Targets

    • Target

      f40cb027df0014cc058fc1f95a7bd7426f7cf3c99505f0ad4d3d7417f1018b74

    • Size

      5.2MB

    • MD5

      28bcb709862f3018c8d40fc53ee8bdca

    • SHA1

      89d41b64ff29a4923e97e47bc3ddac0fd046cc03

    • SHA256

      f40cb027df0014cc058fc1f95a7bd7426f7cf3c99505f0ad4d3d7417f1018b74

    • SHA512

      a89a90e7b8b101326cb1bd859d1e190a70cc56b4b72631f0894482ac6ea8e288f39c4e57347697025dfa8d2f90aff99a0a46c39fe6defcfc3a4626b0902039a0

    • SSDEEP

      98304:CliowwDuyUXXw3fkezmbMZh5uHoo3SoIbRL91Pdqes3OQLnQxla:i5wwzUXazmbM/873gN91P2Qva

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks