General

  • Target

    a3ac0f48ee2a58e7fce6df407d6e4f699e2783a791db31b071efc6ba836e0e68

  • Size

    5.2MB

  • Sample

    240703-lmamcs1aml

  • MD5

    476c67590952d5738673e3df630f6474

  • SHA1

    0cbfd0d563cc54b009508ee5a98e1652ba23de4c

  • SHA256

    a3ac0f48ee2a58e7fce6df407d6e4f699e2783a791db31b071efc6ba836e0e68

  • SHA512

    0f3395c2757583bc9f0e7100790133a9d04e734b2a6c5025fe226c0181da7b7a4294f59b39c161dacf40876ffeaef80ee6f8b28d4ffde8733562f3b6167523cf

  • SSDEEP

    98304:CSkj2tzrrxBd8tY5S3BYxxitarAB5QsYjCIsgrdoSWK1LDN6WBnpsbghUArQxq:84rxB+xYxUKm5lpQBWALcynubgmwQA

Malware Config

Targets

    • Target

      a3ac0f48ee2a58e7fce6df407d6e4f699e2783a791db31b071efc6ba836e0e68

    • Size

      5.2MB

    • MD5

      476c67590952d5738673e3df630f6474

    • SHA1

      0cbfd0d563cc54b009508ee5a98e1652ba23de4c

    • SHA256

      a3ac0f48ee2a58e7fce6df407d6e4f699e2783a791db31b071efc6ba836e0e68

    • SHA512

      0f3395c2757583bc9f0e7100790133a9d04e734b2a6c5025fe226c0181da7b7a4294f59b39c161dacf40876ffeaef80ee6f8b28d4ffde8733562f3b6167523cf

    • SSDEEP

      98304:CSkj2tzrrxBd8tY5S3BYxxitarAB5QsYjCIsgrdoSWK1LDN6WBnpsbghUArQxq:84rxB+xYxUKm5lpQBWALcynubgmwQA

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks