General

  • Target

    b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0

  • Size

    4.5MB

  • Sample

    240530-3czl6seh33

  • MD5

    9e7e2d6b9513b32ac5d0336079a5a76d

  • SHA1

    816a81cb577967fc1e0302bcd547c90da0d08533

  • SHA256

    b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0

  • SHA512

    991c87cd13e91b1266dcc9bdd6dfc867898c67e3c574be8aec8bee2fa97d75ee6c8470dbc880af81214072b099d3d10cfefefb35b7962e7e6c5ffa9a1c259e4b

  • SSDEEP

    98304:mXit+6k7+v/Yna/UX4cwYIUGfghCv1FllwLfU4GL:aiI7+X/U/3GVBwLMP

Malware Config

Targets

    • Target

      b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0

    • Size

      4.5MB

    • MD5

      9e7e2d6b9513b32ac5d0336079a5a76d

    • SHA1

      816a81cb577967fc1e0302bcd547c90da0d08533

    • SHA256

      b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0

    • SHA512

      991c87cd13e91b1266dcc9bdd6dfc867898c67e3c574be8aec8bee2fa97d75ee6c8470dbc880af81214072b099d3d10cfefefb35b7962e7e6c5ffa9a1c259e4b

    • SSDEEP

      98304:mXit+6k7+v/Yna/UX4cwYIUGfghCv1FllwLfU4GL:aiI7+X/U/3GVBwLMP

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks