General

  • Target

    982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41

  • Size

    3.4MB

  • Sample

    240204-eeattsghc8

  • MD5

    d7a57f96714c5ce194d396ba6267acbb

  • SHA1

    7bd55b3ee4727c20d726789fd2a5de08a589d80a

  • SHA256

    982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41

  • SHA512

    0dc547b9c20b86875861da3b570b9258aae6194c73b383890dc4611e89540a3c9ac29cd23fbbb646e9ae7b4b94bc79c6dfd0724c23c4273638286d68b8192613

  • SSDEEP

    49152:V2L8YwQEKyVkFlt3XsAwApxjhMbDIArorewT38nq5YYAexgUQht/yr9Bd9opIzKw:QHHyVAldsAjLjhi8hNTUsBI6hB2KSC9d

Malware Config

Extracted

Family

socks5systemz

Attributes
  • rc4_key

    i4hiea56#7b&dfw3

Targets

    • Target

      982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41

    • Size

      3.4MB

    • MD5

      d7a57f96714c5ce194d396ba6267acbb

    • SHA1

      7bd55b3ee4727c20d726789fd2a5de08a589d80a

    • SHA256

      982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41

    • SHA512

      0dc547b9c20b86875861da3b570b9258aae6194c73b383890dc4611e89540a3c9ac29cd23fbbb646e9ae7b4b94bc79c6dfd0724c23c4273638286d68b8192613

    • SSDEEP

      49152:V2L8YwQEKyVkFlt3XsAwApxjhMbDIArorewT38nq5YYAexgUQht/yr9Bd9opIzKw:QHHyVAldsAjLjhi8hNTUsBI6hB2KSC9d

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks