General

  • Target

    5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80

  • Size

    5.1MB

  • Sample

    240523-fb9peseb6x

  • MD5

    f327c83a85487dfa0ffd18b6c09d0316

  • SHA1

    80bbbcf84f6ddca9f704f2c597b2366844cb4af4

  • SHA256

    5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80

  • SHA512

    758123039f3f664c5422356edda77e1a63e0a08224b681e6da1a4e3f379cf271a193a2c10c2cfe65de28d822bfbafa23a674aac205b148148200f0682f53e8ac

  • SSDEEP

    98304:mNcyl/Z82R5tjq4wmE7xhQl1MAKsFHuiFskii0f/Ai:ycylB82RO4wh7jQlxHupwC

Malware Config

Targets

    • Target

      5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80

    • Size

      5.1MB

    • MD5

      f327c83a85487dfa0ffd18b6c09d0316

    • SHA1

      80bbbcf84f6ddca9f704f2c597b2366844cb4af4

    • SHA256

      5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80

    • SHA512

      758123039f3f664c5422356edda77e1a63e0a08224b681e6da1a4e3f379cf271a193a2c10c2cfe65de28d822bfbafa23a674aac205b148148200f0682f53e8ac

    • SSDEEP

      98304:mNcyl/Z82R5tjq4wmE7xhQl1MAKsFHuiFskii0f/Ai:ycylB82RO4wh7jQlxHupwC

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks