General

  • Target

    144ac616f37f5c0ed210297739b0c8a18a0e10509157746f4838f6a919b12109

  • Size

    5.1MB

  • Sample

    240521-tc816sbb5y

  • MD5

    8a22542dbaeff73ff4d568225451c4d2

  • SHA1

    f93314ce19a042d01aba260f864b8ce9ab4a21e9

  • SHA256

    144ac616f37f5c0ed210297739b0c8a18a0e10509157746f4838f6a919b12109

  • SHA512

    7669058bc32d717831c3ceb191588911c1646c14b8f62988c3c498c96f149b713b0b49a90a0c2ad16beaa42e6086047d60cfc325903cf86e6e30e43674196ff5

  • SSDEEP

    98304:mlOevEg/2tTMLTykpSF4e5hmJHLyRvzuTPrTtx/:levEu22tG4esLTTL/

Malware Config

Targets

    • Target

      144ac616f37f5c0ed210297739b0c8a18a0e10509157746f4838f6a919b12109

    • Size

      5.1MB

    • MD5

      8a22542dbaeff73ff4d568225451c4d2

    • SHA1

      f93314ce19a042d01aba260f864b8ce9ab4a21e9

    • SHA256

      144ac616f37f5c0ed210297739b0c8a18a0e10509157746f4838f6a919b12109

    • SHA512

      7669058bc32d717831c3ceb191588911c1646c14b8f62988c3c498c96f149b713b0b49a90a0c2ad16beaa42e6086047d60cfc325903cf86e6e30e43674196ff5

    • SSDEEP

      98304:mlOevEg/2tTMLTykpSF4e5hmJHLyRvzuTPrTtx/:levEu22tG4esLTTL/

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks