General

  • Target

    cb077f848f607e83a1a3f2493b68e2bf.bin

  • Size

    6.1MB

  • Sample

    240112-d8lbzseabl

  • MD5

    f70bcebcc7c001cf3eca5b696a7650a5

  • SHA1

    2ac7bf33e83272ecb9169de4ed7952fb5bae1174

  • SHA256

    606a9319089b4e634eb007d5da2377e4e5d6d31a9c7d552b942640225f19cb92

  • SHA512

    c4faf03fd6464210483635f91e39dcf75c3f31221d394a5918f466b652089e716778b3b87a174ba0d25f8ee87da28386d9e37853e2ffde6894bd58afc91eda02

  • SSDEEP

    196608:DKpdqTguYWX0JuzVxm4+DefXNy5o+vCsnWjQA8L:D4dqfTXuaxmVef9b+vJWjqL

Malware Config

Targets

    • Target

      a8d74ed7b03a5b5b3b0d6d232d52b817b67be23e95e21eecac100b94ae05dfa6.exe

    • Size

      6.5MB

    • MD5

      cb077f848f607e83a1a3f2493b68e2bf

    • SHA1

      afea35b1dc31714903268dc37784c838154912e3

    • SHA256

      a8d74ed7b03a5b5b3b0d6d232d52b817b67be23e95e21eecac100b94ae05dfa6

    • SHA512

      429cd8cb5e57d5232a240c52068f882d6e889cd96fe32541d507e7b5410159522d18919f244db023da83593489e51b97383571ff232d70acd62a7066e606f0aa

    • SSDEEP

      196608:sDk920n95+J3rm5jSYxrbs9TAUuaS0a4dD:sj0n9k3QLxrbBUuaSadD

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks