General

  • Target

    ab66bde02193daba3dcdc545fe67224b35468d1bdd8b0f0e284c255cb793f700

  • Size

    5.2MB

  • Sample

    240703-na2leszcle

  • MD5

    a802a6dd301baf44324d0a16e7e86196

  • SHA1

    a286177dcf1471bf622bdae67e83e11d11a8d906

  • SHA256

    ab66bde02193daba3dcdc545fe67224b35468d1bdd8b0f0e284c255cb793f700

  • SHA512

    9d0a2b807bdcd57ee49098969f6e3f7425ba1ce80c5720ee4e04768786c3db3f0aadc490d20bafcf6e40e3d4a17efa5fc12f3d79380469683741d653a092b074

  • SSDEEP

    98304:CAGULALf9UbUOxMnLvYZ3Jr0IFrX6B7Uw0xlwCZgW1eRdqTmtfRMT7j+6vOMD3fb:ZGULADa7Knw0Ew0NgWiMa2PSB73LQ5

Malware Config

Targets

    • Target

      ab66bde02193daba3dcdc545fe67224b35468d1bdd8b0f0e284c255cb793f700

    • Size

      5.2MB

    • MD5

      a802a6dd301baf44324d0a16e7e86196

    • SHA1

      a286177dcf1471bf622bdae67e83e11d11a8d906

    • SHA256

      ab66bde02193daba3dcdc545fe67224b35468d1bdd8b0f0e284c255cb793f700

    • SHA512

      9d0a2b807bdcd57ee49098969f6e3f7425ba1ce80c5720ee4e04768786c3db3f0aadc490d20bafcf6e40e3d4a17efa5fc12f3d79380469683741d653a092b074

    • SSDEEP

      98304:CAGULALf9UbUOxMnLvYZ3Jr0IFrX6B7Uw0xlwCZgW1eRdqTmtfRMT7j+6vOMD3fb:ZGULADa7Knw0Ew0NgWiMa2PSB73LQ5

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks