General

  • Target

    0882494a6f516e1e1f542a0d226a66a5cf797d70047e5c52f2139a9150981294

  • Size

    5.1MB

  • Sample

    240523-gg616afe86

  • MD5

    b44ee191038ab4eb3c1ad5def4dceffd

  • SHA1

    3601efeb5f8182fd8e20e5aa078471726733625a

  • SHA256

    0882494a6f516e1e1f542a0d226a66a5cf797d70047e5c52f2139a9150981294

  • SHA512

    8416030177208fcfe304ce0f8b27259936dd62a45e3efddbe8a59a7a6b157dbab427aff35de727f75d4cfcc02952ca1f5f68e405c2937c13f00c4b3a736691bb

  • SSDEEP

    98304:mqzaUySeL4fnPQKPcTeKgmF2X/1FhC0GUWlsi+Dme6HIFkdIfJ:rTaqYKPcpI9u/UWii+i+kdi

Malware Config

Targets

    • Target

      0882494a6f516e1e1f542a0d226a66a5cf797d70047e5c52f2139a9150981294

    • Size

      5.1MB

    • MD5

      b44ee191038ab4eb3c1ad5def4dceffd

    • SHA1

      3601efeb5f8182fd8e20e5aa078471726733625a

    • SHA256

      0882494a6f516e1e1f542a0d226a66a5cf797d70047e5c52f2139a9150981294

    • SHA512

      8416030177208fcfe304ce0f8b27259936dd62a45e3efddbe8a59a7a6b157dbab427aff35de727f75d4cfcc02952ca1f5f68e405c2937c13f00c4b3a736691bb

    • SSDEEP

      98304:mqzaUySeL4fnPQKPcTeKgmF2X/1FhC0GUWlsi+Dme6HIFkdIfJ:rTaqYKPcpI9u/UWii+i+kdi

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks