General

  • Target

    02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2

  • Size

    7.8MB

  • Sample

    231210-17h7kafab5

  • MD5

    6c26267552a2bfff3a4ffba3ef0b8241

  • SHA1

    ff26cbcee3e00bd4e633229a89707dd31def6858

  • SHA256

    02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2

  • SHA512

    924c1aed45f9d52bffdaa820744a2b5fc2a54cee21cea93026ecc1b3feac386c1755ee39522584fe808d318c5e993b960c7bce738dad1aa9a64dbaae2aa6e419

  • SSDEEP

    98304:2WQE2Gy2qRt4v6DaIJYcDj8li3+Qhwy00q7HelOkNdJrGIFEYriWcr+r06XxkC07:EzBXRQKaAT3Vk0nf2Iy+ixq0DBzf44bd

Malware Config

Extracted

Family

socks5systemz

Attributes
  • rc4_key

    i4hiea56#7b&dfw3

Targets

    • Target

      02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2

    • Size

      7.8MB

    • MD5

      6c26267552a2bfff3a4ffba3ef0b8241

    • SHA1

      ff26cbcee3e00bd4e633229a89707dd31def6858

    • SHA256

      02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2

    • SHA512

      924c1aed45f9d52bffdaa820744a2b5fc2a54cee21cea93026ecc1b3feac386c1755ee39522584fe808d318c5e993b960c7bce738dad1aa9a64dbaae2aa6e419

    • SSDEEP

      98304:2WQE2Gy2qRt4v6DaIJYcDj8li3+Qhwy00q7HelOkNdJrGIFEYriWcr+r06XxkC07:EzBXRQKaAT3Vk0nf2Iy+ixq0DBzf44bd

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks