General

  • Target

    d0050f97a0b89fca38d227b43f3e6d6881b4e6b88be778cb24fb70af56402e78

  • Size

    5.1MB

  • Sample

    240703-ewd8ks1crp

  • MD5

    879cb6bc3bc8546885c36f32f9570b63

  • SHA1

    1679898e27f7301a241d35b70b49fe8c2dea3ad1

  • SHA256

    d0050f97a0b89fca38d227b43f3e6d6881b4e6b88be778cb24fb70af56402e78

  • SHA512

    3a00c59d19839418b50e57e42749bd3cfa7c255382a8239e60840169544849a32b50cc865b5c42c03fc9387b6f9a8d6b214b9f8f74e26fb657371be3c3fcbf64

  • SSDEEP

    98304:CbTuyuDMD3uKhCu2yUrTSs9/CdaWysaaAdUDnHHd12FCYug0QQxt:ES2tN0SshC4WJAWNgBQf

Malware Config

Targets

    • Target

      d0050f97a0b89fca38d227b43f3e6d6881b4e6b88be778cb24fb70af56402e78

    • Size

      5.1MB

    • MD5

      879cb6bc3bc8546885c36f32f9570b63

    • SHA1

      1679898e27f7301a241d35b70b49fe8c2dea3ad1

    • SHA256

      d0050f97a0b89fca38d227b43f3e6d6881b4e6b88be778cb24fb70af56402e78

    • SHA512

      3a00c59d19839418b50e57e42749bd3cfa7c255382a8239e60840169544849a32b50cc865b5c42c03fc9387b6f9a8d6b214b9f8f74e26fb657371be3c3fcbf64

    • SSDEEP

      98304:CbTuyuDMD3uKhCu2yUrTSs9/CdaWysaaAdUDnHHd12FCYug0QQxt:ES2tN0SshC4WJAWNgBQf

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks