General

  • Target

    98eeb5fae4a928d8d8a7aa6735cf5cc7a2622cd824cfac9e1abac4ce5c4390de

  • Size

    4.6MB

  • Sample

    240523-teycfsge86

  • MD5

    096fe09679ed7c934d91b3cc3ac0d3a0

  • SHA1

    c06123d0ab9e5ac243df51a106135fa301c801c2

  • SHA256

    98eeb5fae4a928d8d8a7aa6735cf5cc7a2622cd824cfac9e1abac4ce5c4390de

  • SHA512

    49b43ac951356b2638f08031bef7cd3e47f4cf7912fcc68a6f7d724d1873fc7011b19a8baced13235fe1d48e381c3da72f273334e112cf616f49a8afc10ba6f0

  • SSDEEP

    98304:mJp7GjWPYAiqqtTPzapo+kXp/6CBz008TlNx4XCeeWKiai9h:EaWPIJTPzapop5/6CBz008HxreHai9h

Malware Config

Targets

    • Target

      98eeb5fae4a928d8d8a7aa6735cf5cc7a2622cd824cfac9e1abac4ce5c4390de

    • Size

      4.6MB

    • MD5

      096fe09679ed7c934d91b3cc3ac0d3a0

    • SHA1

      c06123d0ab9e5ac243df51a106135fa301c801c2

    • SHA256

      98eeb5fae4a928d8d8a7aa6735cf5cc7a2622cd824cfac9e1abac4ce5c4390de

    • SHA512

      49b43ac951356b2638f08031bef7cd3e47f4cf7912fcc68a6f7d724d1873fc7011b19a8baced13235fe1d48e381c3da72f273334e112cf616f49a8afc10ba6f0

    • SSDEEP

      98304:mJp7GjWPYAiqqtTPzapo+kXp/6CBz008TlNx4XCeeWKiai9h:EaWPIJTPzapop5/6CBz008HxreHai9h

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks