General

  • Target

    42fbb33261e97342f83ac45b95d26c93430eede83d6ec22b869bf6985e2f2fde

  • Size

    4.4MB

  • Sample

    240523-hdvpdsge38

  • MD5

    5e5d549580bc8e425b3163522b7596a3

  • SHA1

    8fc9a6ef9037abb75aa70c79db5461c9e8fc2900

  • SHA256

    42fbb33261e97342f83ac45b95d26c93430eede83d6ec22b869bf6985e2f2fde

  • SHA512

    f06d8be12811437093b4b81aa7928a7d28998e0a156c61294d869c725448a84e828e7496faebc00450b8dda5612324fa8deba3870dbe1b97bbf6f9aad8f5a6b0

  • SSDEEP

    98304:m/joxIwXnpMeeGoVAfOG48YHACwDQKGxL9d8Vx11aIHrMr:EcW4WeFoqfOG42sxhqVb1aEk

Malware Config

Targets

    • Target

      42fbb33261e97342f83ac45b95d26c93430eede83d6ec22b869bf6985e2f2fde

    • Size

      4.4MB

    • MD5

      5e5d549580bc8e425b3163522b7596a3

    • SHA1

      8fc9a6ef9037abb75aa70c79db5461c9e8fc2900

    • SHA256

      42fbb33261e97342f83ac45b95d26c93430eede83d6ec22b869bf6985e2f2fde

    • SHA512

      f06d8be12811437093b4b81aa7928a7d28998e0a156c61294d869c725448a84e828e7496faebc00450b8dda5612324fa8deba3870dbe1b97bbf6f9aad8f5a6b0

    • SSDEEP

      98304:m/joxIwXnpMeeGoVAfOG48YHACwDQKGxL9d8Vx11aIHrMr:EcW4WeFoqfOG42sxhqVb1aEk

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks