General

  • Target

    7e0cebfc6921c77d4e7108ae44c320d0fc7152e2e165e5d98121ce124083f56c

  • Size

    4.9MB

  • Sample

    240529-clz17afc63

  • MD5

    6c483d0fdf3f248c0711e6f0d8f8567f

  • SHA1

    df72918c92a043f8e8601e6af8ec9523924be6c8

  • SHA256

    7e0cebfc6921c77d4e7108ae44c320d0fc7152e2e165e5d98121ce124083f56c

  • SHA512

    391c917692139e93fce118f027c153bba1b707a53187e095085710eedac1b9f9c54a65083016e74f4af9a1a9c9e4c1bc36f45a948b86c28a2fd84fc5f422a1bc

  • SSDEEP

    98304:mwbRwzNg5DtLhPn7I64w4orGGziad+wPkc7NXzzJdTN2oNVVx02edmzJIy:CzN6hPE4r/ziad+wBhB22VUddmz7

Malware Config

Targets

    • Target

      7e0cebfc6921c77d4e7108ae44c320d0fc7152e2e165e5d98121ce124083f56c

    • Size

      4.9MB

    • MD5

      6c483d0fdf3f248c0711e6f0d8f8567f

    • SHA1

      df72918c92a043f8e8601e6af8ec9523924be6c8

    • SHA256

      7e0cebfc6921c77d4e7108ae44c320d0fc7152e2e165e5d98121ce124083f56c

    • SHA512

      391c917692139e93fce118f027c153bba1b707a53187e095085710eedac1b9f9c54a65083016e74f4af9a1a9c9e4c1bc36f45a948b86c28a2fd84fc5f422a1bc

    • SSDEEP

      98304:mwbRwzNg5DtLhPn7I64w4orGGziad+wPkc7NXzzJdTN2oNVVx02edmzJIy:CzN6hPE4r/ziad+wBhB22VUddmz7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks