General

  • Target

    eb7c25eacb194ab5b2cbc396775db46312b2681c50928300f0dc433e4e4df833

  • Size

    4.5MB

  • Sample

    240514-1a6atshh39

  • MD5

    1d184788f71f4d9176501cd50c353e2f

  • SHA1

    74abf131b968b7a9716652ce36d5cc894f5c208c

  • SHA256

    eb7c25eacb194ab5b2cbc396775db46312b2681c50928300f0dc433e4e4df833

  • SHA512

    9f5cdd5e951af65ce3ef49321c41b15647081a2c75412f38b5d76b4d2792ccb77de6af1099da767408a4515608e1bd067fde2545d5dd15fe1b2d68f09e8f698c

  • SSDEEP

    98304:AYdXsIEgtBRkix1oycRv9gpptVIkLh2/++K0jJ7JCthJSV7v7:Pdc5gHobR9eptKkI/++PDShJS9v7

Malware Config

Targets

    • Target

      eb7c25eacb194ab5b2cbc396775db46312b2681c50928300f0dc433e4e4df833

    • Size

      4.5MB

    • MD5

      1d184788f71f4d9176501cd50c353e2f

    • SHA1

      74abf131b968b7a9716652ce36d5cc894f5c208c

    • SHA256

      eb7c25eacb194ab5b2cbc396775db46312b2681c50928300f0dc433e4e4df833

    • SHA512

      9f5cdd5e951af65ce3ef49321c41b15647081a2c75412f38b5d76b4d2792ccb77de6af1099da767408a4515608e1bd067fde2545d5dd15fe1b2d68f09e8f698c

    • SSDEEP

      98304:AYdXsIEgtBRkix1oycRv9gpptVIkLh2/++K0jJ7JCthJSV7v7:Pdc5gHobR9eptKkI/++PDShJS9v7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks