General

  • Target

    5dad68a8228450333b6202358c2fc50fe5ec7527c51e391c13354ab7ce27e667.exe

  • Size

    4.7MB

  • Sample

    231231-qj7vxahgap

  • MD5

    e7cf81aa7dafde2a945a0b054aecabee

  • SHA1

    7a48e41edf8aea74ae8e59af2019ced8eca16b28

  • SHA256

    5dad68a8228450333b6202358c2fc50fe5ec7527c51e391c13354ab7ce27e667

  • SHA512

    a60ba4864348388f8d8b9a686a47a3e075caf57e67473cf67544b75b4333bf8d2ff081267d944b2a179d8ae8708a1853a05bf24bf1633788d873b9278f60707c

  • SSDEEP

    98304:QbxHd5z86gNOs302SmhL8L2EmPFYSkeR14ekJ4MqKw4Z0T4dm8:AVo64O+phL8LkPFYLeRxD34ZM4dD

Malware Config

Targets

    • Target

      5dad68a8228450333b6202358c2fc50fe5ec7527c51e391c13354ab7ce27e667.exe

    • Size

      4.7MB

    • MD5

      e7cf81aa7dafde2a945a0b054aecabee

    • SHA1

      7a48e41edf8aea74ae8e59af2019ced8eca16b28

    • SHA256

      5dad68a8228450333b6202358c2fc50fe5ec7527c51e391c13354ab7ce27e667

    • SHA512

      a60ba4864348388f8d8b9a686a47a3e075caf57e67473cf67544b75b4333bf8d2ff081267d944b2a179d8ae8708a1853a05bf24bf1633788d873b9278f60707c

    • SSDEEP

      98304:QbxHd5z86gNOs302SmhL8L2EmPFYSkeR14ekJ4MqKw4Z0T4dm8:AVo64O+phL8LkPFYLeRxD34ZM4dD

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks