General

  • Target

    a0925023369da931b631f8ab591358d7532c365c32a0cc206464725c70b99e17

  • Size

    5.1MB

  • Sample

    240522-yx2j2seh96

  • MD5

    65b4aec861e9773d1c0421821d338efb

  • SHA1

    0972e6094f51a2952fce913d4f6c45d0bf759a28

  • SHA256

    a0925023369da931b631f8ab591358d7532c365c32a0cc206464725c70b99e17

  • SHA512

    79a88923119357da99a51751cdcff1f1caab51654362ed3b72239d162e76a0a5bc57397885eb268c25ffecc9052c669610c95e0cf996b5cad6a371a9486dde37

  • SSDEEP

    98304:miIGESvjzFDyurEVkf0ZA5RRkhu08SRP+QmX0+CDnsxXwuqziz8euY8C50XFVhVS:PRE0pD9mkMe5RWhu08uP+QmXCD4Xw7zS

Malware Config

Targets

    • Target

      a0925023369da931b631f8ab591358d7532c365c32a0cc206464725c70b99e17

    • Size

      5.1MB

    • MD5

      65b4aec861e9773d1c0421821d338efb

    • SHA1

      0972e6094f51a2952fce913d4f6c45d0bf759a28

    • SHA256

      a0925023369da931b631f8ab591358d7532c365c32a0cc206464725c70b99e17

    • SHA512

      79a88923119357da99a51751cdcff1f1caab51654362ed3b72239d162e76a0a5bc57397885eb268c25ffecc9052c669610c95e0cf996b5cad6a371a9486dde37

    • SSDEEP

      98304:miIGESvjzFDyurEVkf0ZA5RRkhu08SRP+QmX0+CDnsxXwuqziz8euY8C50XFVhVS:PRE0pD9mkMe5RWhu08uP+QmXCD4Xw7zS

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks