General

  • Target

    6b0db00703abd4a4e5d245e6c70b7678b0d9e6cd14171399b0110be37550f37c

  • Size

    2.0MB

  • Sample

    240323-wew6hach2w

  • MD5

    295e0a6b24d257762e105940104b3474

  • SHA1

    f069fafdc6b2ddec149344f9a72a568ba9689373

  • SHA256

    6b0db00703abd4a4e5d245e6c70b7678b0d9e6cd14171399b0110be37550f37c

  • SHA512

    0091be0aed7b3448b1ce0fbf4a13a2f87cd563f4a6dea2b36c497fda663ce4217a14e6022f433ce4e1916b5e9bf96a84e6e2545fa240ff8f43671b888edb54d3

  • SSDEEP

    49152:32yPZXKlPAQi3UdbOOjkpRs9vsIOUoGM5M:myPZXKlPldKmkvsxsIOU0M

Malware Config

Extracted

Family

socks5systemz

C2

http://ddtidon.info/search/?q=67e28dd83a5da32a155afd1b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a271ea771795af8e05c642db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ffe13c1e9969839

http://bfbzame.com/search/?q=67e28dd83a58f22a160bab1e7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a071ea771795af8e05c642db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ffe13c1e9969a39

Targets

    • Target

      6b0db00703abd4a4e5d245e6c70b7678b0d9e6cd14171399b0110be37550f37c

    • Size

      2.0MB

    • MD5

      295e0a6b24d257762e105940104b3474

    • SHA1

      f069fafdc6b2ddec149344f9a72a568ba9689373

    • SHA256

      6b0db00703abd4a4e5d245e6c70b7678b0d9e6cd14171399b0110be37550f37c

    • SHA512

      0091be0aed7b3448b1ce0fbf4a13a2f87cd563f4a6dea2b36c497fda663ce4217a14e6022f433ce4e1916b5e9bf96a84e6e2545fa240ff8f43671b888edb54d3

    • SSDEEP

      49152:32yPZXKlPAQi3UdbOOjkpRs9vsIOUoGM5M:myPZXKlPldKmkvsxsIOU0M

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks