General

  • Target

    456d59855de357997c62a5ae94fd8efbf6a1563bc0d88ec572b0a19feb7bc53f

  • Size

    5.1MB

  • Sample

    240520-zd1zvaga84

  • MD5

    656da4e8d58ffb5106563bd53c8ee75b

  • SHA1

    e430f2f363424d378fcbe4ec3450b858b7648880

  • SHA256

    456d59855de357997c62a5ae94fd8efbf6a1563bc0d88ec572b0a19feb7bc53f

  • SHA512

    84b713b78ee89310ad95718499642d3a548d1faf2194995a4d37955275711be04f9319f023f2eef3fcffb1cadb76c305646c822ac54b9b05c9578a9b97dfffe3

  • SSDEEP

    98304:mcWdfgQlT4BWTtJFxScRC+q+JlB0dUSOkGbC6JIAJQIyDR:noaBWTT1//TiUXDnNI

Malware Config

Targets

    • Target

      456d59855de357997c62a5ae94fd8efbf6a1563bc0d88ec572b0a19feb7bc53f

    • Size

      5.1MB

    • MD5

      656da4e8d58ffb5106563bd53c8ee75b

    • SHA1

      e430f2f363424d378fcbe4ec3450b858b7648880

    • SHA256

      456d59855de357997c62a5ae94fd8efbf6a1563bc0d88ec572b0a19feb7bc53f

    • SHA512

      84b713b78ee89310ad95718499642d3a548d1faf2194995a4d37955275711be04f9319f023f2eef3fcffb1cadb76c305646c822ac54b9b05c9578a9b97dfffe3

    • SSDEEP

      98304:mcWdfgQlT4BWTtJFxScRC+q+JlB0dUSOkGbC6JIAJQIyDR:noaBWTT1//TiUXDnNI

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks