General

  • Target

    8fe9ec621008b29e7c47a4a2fc492d28.bin

  • Size

    2.0MB

  • Sample

    240325-dqhs5she9w

  • MD5

    bb753b1c0fe3ecbf83b82136f0405e0f

  • SHA1

    9f1cad16113308246d8b47b8e3534837f2450302

  • SHA256

    a96c13cc4a2def1f6b62789c8c63da8ae11f4d83dff558a46fb5dfd8f4a581dd

  • SHA512

    5743f268a46993ed28fc824ef76293458be52c1b9e88aa1fac0da91323d3592c4c54c207c6b2cc36f8676be864033267005e1774f91c73d5b6513aa7c55c1466

  • SSDEEP

    49152:hHmJ5QC1Us2CPRwsmH96GF04t11afc2sayfuxT:9mJ5D1UvwTXGHt11CcyLl

Malware Config

Extracted

Family

socks5systemz

C2

http://bujubwn.com/search/?q=67e28dd83f0bf1291606a9177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f171ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a668dfc17c4ed91

http://bujubwn.com/search/?q=67e28dd83f0bf1291606a9177c27d78406abdd88be4b12eab517aa5c96bd86e99d824a815a8bbc896c58e713bc90c91836b5281fc235a925ed3e52d6bd974a95129070b616e96cc92be20ea778c255bbe258b90d3b4eed3233d1626a8ff810c1ec969c3fcf6b

http://dleeqkm.info/search/?q=67e28dd86a5cf47e155fff1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ffe12c3e991983f

http://dleeqkm.info/search/?q=67e28dd86a5cf47e155fff1a7c27d78406abdd88be4b12eab517aa5c96bd86e993854f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e5cd6bd974a95129070b616e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee949938cb6b9412

Targets

    • Target

      a7a7a60fa640fc9a4dbdbac52b68a1774bb159b99c179df650c9f41fd4d20a6a.exe

    • Size

      2.0MB

    • MD5

      8fe9ec621008b29e7c47a4a2fc492d28

    • SHA1

      f8930f4037b081f0c54b00f0d1e93d936a7af669

    • SHA256

      a7a7a60fa640fc9a4dbdbac52b68a1774bb159b99c179df650c9f41fd4d20a6a

    • SHA512

      2eb25f96e289fee6ad2f70710c39b27c30db889f683a24a4592c47862cfeec84f2c25dacc73d267897f67dc3ec212de4065e0c2719188bc01aaded9af7512b41

    • SSDEEP

      49152:32dOY3q2cSnjXhVR5ZbNk6tpebYwyq0yRa2pQroFa98:m93F1jTR5Z7uM5LkGroFa6

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks