General

  • Target

    13b637c127d365e67fb447ceb361e7b799319e20a2e31bc9daa09e9bc6039377

  • Size

    5.3MB

  • Sample

    240521-txe9labf47

  • MD5

    245262777cd555a8ab6042f5152e02c8

  • SHA1

    61907ae5e7195d4848a589ae183e181969589fcf

  • SHA256

    13b637c127d365e67fb447ceb361e7b799319e20a2e31bc9daa09e9bc6039377

  • SHA512

    86392902336202f302b92bf0ddfb8459085676b572ee93a62eba9b1ba4e67df48ec5668cf30391fb7ebfc1cb80298de081f13a84a6e10c4f35b1cd05d3b0e817

  • SSDEEP

    98304:mYiIk+DoDY9AbbrvPAIxD8JruGP39i/7krYLhG+cUDcuw9o0pq30Fy2:v5LGZr3x3GPNicK/cUTw9xpqkFy2

Malware Config

Targets

    • Target

      13b637c127d365e67fb447ceb361e7b799319e20a2e31bc9daa09e9bc6039377

    • Size

      5.3MB

    • MD5

      245262777cd555a8ab6042f5152e02c8

    • SHA1

      61907ae5e7195d4848a589ae183e181969589fcf

    • SHA256

      13b637c127d365e67fb447ceb361e7b799319e20a2e31bc9daa09e9bc6039377

    • SHA512

      86392902336202f302b92bf0ddfb8459085676b572ee93a62eba9b1ba4e67df48ec5668cf30391fb7ebfc1cb80298de081f13a84a6e10c4f35b1cd05d3b0e817

    • SSDEEP

      98304:mYiIk+DoDY9AbbrvPAIxD8JruGP39i/7krYLhG+cUDcuw9o0pq30Fy2:v5LGZr3x3GPNicK/cUTw9xpqkFy2

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks