General

  • Target

    15bf28e17d6090efa18b146b1b8fb5ba956f5659dce05d47f3d3f8444759a280

  • Size

    5.0MB

  • Sample

    240523-2prlnaca47

  • MD5

    4ab8026325aa360d870c1ddc10342ff1

  • SHA1

    088ce834a3203fcb71772b74f8d7a749591d9324

  • SHA256

    15bf28e17d6090efa18b146b1b8fb5ba956f5659dce05d47f3d3f8444759a280

  • SHA512

    2a0031a058ced9c95a51409795dac8c0185be2963d6a32a5b86cbdefa1eca18a427dece5b943f63b71e3dc5bf2b7bf7fafadb5b80b09301c39721eaf50999eb7

  • SSDEEP

    98304:mO0AQ1E7VPIQf6dnWdtyIQfLrhmFftpqCcDaBfpBMXjLjUqKrCnZ/Nj6L7:HfiEJP8+t4rIFf7ZpKXjcq+Q/sP

Malware Config

Targets

    • Target

      15bf28e17d6090efa18b146b1b8fb5ba956f5659dce05d47f3d3f8444759a280

    • Size

      5.0MB

    • MD5

      4ab8026325aa360d870c1ddc10342ff1

    • SHA1

      088ce834a3203fcb71772b74f8d7a749591d9324

    • SHA256

      15bf28e17d6090efa18b146b1b8fb5ba956f5659dce05d47f3d3f8444759a280

    • SHA512

      2a0031a058ced9c95a51409795dac8c0185be2963d6a32a5b86cbdefa1eca18a427dece5b943f63b71e3dc5bf2b7bf7fafadb5b80b09301c39721eaf50999eb7

    • SSDEEP

      98304:mO0AQ1E7VPIQf6dnWdtyIQfLrhmFftpqCcDaBfpBMXjLjUqKrCnZ/Nj6L7:HfiEJP8+t4rIFf7ZpKXjcq+Q/sP

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks