General

  • Target

    40fdeba9374448f8ca122ba371626c57e61984e20cb66f98192451185b59bb76

  • Size

    6.1MB

  • Sample

    240529-wweb1sdf89

  • MD5

    3f35c7f6d7e2b039ce2cd3108247815e

  • SHA1

    d79be59fa425b4910e485233a4fedee19d5c8be9

  • SHA256

    40fdeba9374448f8ca122ba371626c57e61984e20cb66f98192451185b59bb76

  • SHA512

    88e7447400060b2dc97446da500c985ce2185dc92ce498d0a6d8be5621ad2e5b15ccf7322971f967d6afe4700e5a7ff6edf6cef311325be97cb78d989d09b89f

  • SSDEEP

    98304:mi6Ep4QR2G063dn2he6SoxaoDyR93/ueMbagpf8YI70Mg2BlmJeob7lk0nHEvmuN:t6E7J3206S1bCeYIoOlsnHgmu+lO

Malware Config

Targets

    • Target

      40fdeba9374448f8ca122ba371626c57e61984e20cb66f98192451185b59bb76

    • Size

      6.1MB

    • MD5

      3f35c7f6d7e2b039ce2cd3108247815e

    • SHA1

      d79be59fa425b4910e485233a4fedee19d5c8be9

    • SHA256

      40fdeba9374448f8ca122ba371626c57e61984e20cb66f98192451185b59bb76

    • SHA512

      88e7447400060b2dc97446da500c985ce2185dc92ce498d0a6d8be5621ad2e5b15ccf7322971f967d6afe4700e5a7ff6edf6cef311325be97cb78d989d09b89f

    • SSDEEP

      98304:mi6Ep4QR2G063dn2he6SoxaoDyR93/ueMbagpf8YI70Mg2BlmJeob7lk0nHEvmuN:t6E7J3206S1bCeYIoOlsnHgmu+lO

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks