General

  • Target

    1f767ece94f8e4d411cbac71018f68d10b5cc8bf9a853877b7418289acf62324

  • Size

    5.3MB

  • Sample

    240704-pw2zraygpa

  • MD5

    7e4b453df7f88e36c4690ea1e1f3fe81

  • SHA1

    bba552a06bcfd6bcf1ee06403f0a60e3b1fce22a

  • SHA256

    1f767ece94f8e4d411cbac71018f68d10b5cc8bf9a853877b7418289acf62324

  • SHA512

    143f4f0ad972bcd536e4c8171a1d6aff1b3c32db09eff98ff8068a66de25ff0c07c7d6fb0e883a3a85f0463893bae8094522dd2737acc17128693e1c28b4627f

  • SSDEEP

    98304:Ca3LjWpEFb7zMb0Vn0Vo9kC+ziTbWGS8EJno3k0WTOtVtVjkqZf++SQx3xw:x/Zd/k0V0VoLKnnBTM7j25Qrw

Malware Config

Targets

    • Target

      1f767ece94f8e4d411cbac71018f68d10b5cc8bf9a853877b7418289acf62324

    • Size

      5.3MB

    • MD5

      7e4b453df7f88e36c4690ea1e1f3fe81

    • SHA1

      bba552a06bcfd6bcf1ee06403f0a60e3b1fce22a

    • SHA256

      1f767ece94f8e4d411cbac71018f68d10b5cc8bf9a853877b7418289acf62324

    • SHA512

      143f4f0ad972bcd536e4c8171a1d6aff1b3c32db09eff98ff8068a66de25ff0c07c7d6fb0e883a3a85f0463893bae8094522dd2737acc17128693e1c28b4627f

    • SSDEEP

      98304:Ca3LjWpEFb7zMb0Vn0Vo9kC+ziTbWGS8EJno3k0WTOtVtVjkqZf++SQx3xw:x/Zd/k0V0VoLKnnBTM7j25Qrw

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks