General

  • Target

    8550b2ce8bb9e04a817b9a7ec5934e7f8a4b9ac0d6d0078e307dfdc80d61c10c

  • Size

    5.4MB

  • Sample

    240530-26mn2ade3y

  • MD5

    a395dad8b3f200025297f491b73b4df0

  • SHA1

    febe93c5d8341f56909a9a2f86b0c0b71919d143

  • SHA256

    8550b2ce8bb9e04a817b9a7ec5934e7f8a4b9ac0d6d0078e307dfdc80d61c10c

  • SHA512

    f3023a2eb0da4e767bd773549fdb2766755aef4d2f680d6659825b0bb4c1c66451e26e4523e19b712be0812c8c705acbb9769570a8e6b6ef205d5bb3b8158470

  • SSDEEP

    98304:mRpjLfN6LM+iUhPWfPwMKH2Q8WYuWZmH9KCPo2XkWu1jwyYcPDFbv1:qfUvP8MHXRQmH42UWEDx1

Malware Config

Targets

    • Target

      8550b2ce8bb9e04a817b9a7ec5934e7f8a4b9ac0d6d0078e307dfdc80d61c10c

    • Size

      5.4MB

    • MD5

      a395dad8b3f200025297f491b73b4df0

    • SHA1

      febe93c5d8341f56909a9a2f86b0c0b71919d143

    • SHA256

      8550b2ce8bb9e04a817b9a7ec5934e7f8a4b9ac0d6d0078e307dfdc80d61c10c

    • SHA512

      f3023a2eb0da4e767bd773549fdb2766755aef4d2f680d6659825b0bb4c1c66451e26e4523e19b712be0812c8c705acbb9769570a8e6b6ef205d5bb3b8158470

    • SSDEEP

      98304:mRpjLfN6LM+iUhPWfPwMKH2Q8WYuWZmH9KCPo2XkWu1jwyYcPDFbv1:qfUvP8MHXRQmH42UWEDx1

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks