General

  • Target

    c0ddb4b2ce5246b93e23bce91d7cb83c388d909f05f38c5fb0762786e65d2895

  • Size

    2.1MB

  • Sample

    240326-zmrsjaca62

  • MD5

    7cab479f4baaa691fd638adb03941fcc

  • SHA1

    61deb668973af8a6041524096d2faab0dcfedfc1

  • SHA256

    c0ddb4b2ce5246b93e23bce91d7cb83c388d909f05f38c5fb0762786e65d2895

  • SHA512

    0d4a5f6d6b1a3ce4802cbaf562b6eacd6d6accab92fae01fe90a8c674554bdae0187b022f47dd7b69f27ef4a33da5c069958103766e34790d3a689a318859cc2

  • SSDEEP

    49152:32iOwRvHVLfAwWV82J5Pnr0Mk3JWivCsH28KxNIhW63qwjn:mu/V8wj2J5PnQMk3EivCsH29xK4C/jn

Malware Config

Extracted

Family

socks5systemz

C2

http://aquaind.ru/search/?q=67e28dd8685ff32d4309f94d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f771ea771795af8e05c642db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ffe15c8e9969b39

http://aqlhjzo.ru/search/?q=67e28dd86b55fb7a410dae497c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa49e8889b5e4fa9281ae978a471ea771795af8e05c642db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ffe15c8e9979233

http://aqlhjzo.ru/search/?q=67e28dd86b55fb7a410dae497c27d78406abdd88be4b12eab517aa5c96bd86e891804b875a8bbc896c58e713bc90c91c36b5281fc235a925ed3e07d6bd974a95129070b611e96cc92be510b866db51b9e34eed4c2b14a82966836f23d7f210c7ee949e33cb6d9e1e

Targets

    • Target

      c0ddb4b2ce5246b93e23bce91d7cb83c388d909f05f38c5fb0762786e65d2895

    • Size

      2.1MB

    • MD5

      7cab479f4baaa691fd638adb03941fcc

    • SHA1

      61deb668973af8a6041524096d2faab0dcfedfc1

    • SHA256

      c0ddb4b2ce5246b93e23bce91d7cb83c388d909f05f38c5fb0762786e65d2895

    • SHA512

      0d4a5f6d6b1a3ce4802cbaf562b6eacd6d6accab92fae01fe90a8c674554bdae0187b022f47dd7b69f27ef4a33da5c069958103766e34790d3a689a318859cc2

    • SSDEEP

      49152:32iOwRvHVLfAwWV82J5Pnr0Mk3JWivCsH28KxNIhW63qwjn:mu/V8wj2J5PnQMk3EivCsH29xK4C/jn

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks