General

  • Target

    499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d

  • Size

    3.4MB

  • Sample

    240204-d7673aahbq

  • MD5

    592a701bc4892547ef1a96a6336548de

  • SHA1

    b9cf102da3627d412154736f09f8ecfac42a59fd

  • SHA256

    499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d

  • SHA512

    c1a9ab4c6fb2b55ce0f4dd215539203952ceb52370acbe969f846eb58c7fe44305d454cda7008e1f793ffc3af074ed009a4adaef3ef547b1b3b6e25ba9d86bd4

  • SSDEEP

    98304:cjBf676DpowCfpV48epyfqhhYW/8ZEflpvEvCYjxlE:6fA6FowCfrMpyMR8ZEflaqYjxu

Malware Config

Extracted

Family

socks5systemz

Attributes
  • rc4_key

    i4hiea56#7b&dfw3

Targets

    • Target

      499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d

    • Size

      3.4MB

    • MD5

      592a701bc4892547ef1a96a6336548de

    • SHA1

      b9cf102da3627d412154736f09f8ecfac42a59fd

    • SHA256

      499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d

    • SHA512

      c1a9ab4c6fb2b55ce0f4dd215539203952ceb52370acbe969f846eb58c7fe44305d454cda7008e1f793ffc3af074ed009a4adaef3ef547b1b3b6e25ba9d86bd4

    • SSDEEP

      98304:cjBf676DpowCfpV48epyfqhhYW/8ZEflpvEvCYjxlE:6fA6FowCfrMpyMR8ZEflaqYjxu

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks