General

  • Target

    da39481f71d40d59a79916553e7e97aeed58ed9962664ebe43018e0566004604

  • Size

    5.6MB

  • Sample

    240527-2sxbbach6w

  • MD5

    c9778793944e0328f2b896dac9f18bbf

  • SHA1

    aa14e46d1e2b4e4df69db2c669692b089a1860bd

  • SHA256

    da39481f71d40d59a79916553e7e97aeed58ed9962664ebe43018e0566004604

  • SHA512

    d6c06f36d9ee2d28bcea6a8f57b8ced06f265ae201eca73f40b8d4e5964b031cfcca97c32427c768305686f032b885980d2f322ad1db7c4de228aaa61771fa0d

  • SSDEEP

    98304:mSVBKLokfcT/KQUi9FGiIATa6hTA9gDVeuibZpcWWWTPakaR6kS7lEaaIf/cY:lOI/KQnz42TA9g0pcKwR6ksEEcY

Malware Config

Targets

    • Target

      da39481f71d40d59a79916553e7e97aeed58ed9962664ebe43018e0566004604

    • Size

      5.6MB

    • MD5

      c9778793944e0328f2b896dac9f18bbf

    • SHA1

      aa14e46d1e2b4e4df69db2c669692b089a1860bd

    • SHA256

      da39481f71d40d59a79916553e7e97aeed58ed9962664ebe43018e0566004604

    • SHA512

      d6c06f36d9ee2d28bcea6a8f57b8ced06f265ae201eca73f40b8d4e5964b031cfcca97c32427c768305686f032b885980d2f322ad1db7c4de228aaa61771fa0d

    • SSDEEP

      98304:mSVBKLokfcT/KQUi9FGiIATa6hTA9gDVeuibZpcWWWTPakaR6kS7lEaaIf/cY:lOI/KQnz42TA9g0pcKwR6ksEEcY

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks