General

  • Target

    b88def68bb5a317e7e356309ee8edba14fde5e2fc867bff7385e3fda024c08d6

  • Size

    4.6MB

  • Sample

    240530-3drmysdh8z

  • MD5

    1a889f8c09b580429b1eda6843c9868d

  • SHA1

    b45133c0c3c2110ddf66c78fcbadc94513fa185b

  • SHA256

    b88def68bb5a317e7e356309ee8edba14fde5e2fc867bff7385e3fda024c08d6

  • SHA512

    f0ec08a0688d43dc1e3ce96a4fea874b9787c47b3cbbf97ab1be23c7f258039083093fc13d3bb30b9457623fa9972575c2d42557dc3b59f5ce2bb6a8f6a99afa

  • SSDEEP

    98304:mbY1qijV+n1wH8hcHGovoXMuTimi1cwetidz8w6vm22xgdc7TlJ6BSLR/u4:9J+n1w1HjvoXM+imi+htit8wP8c7ZIB8

Malware Config

Targets

    • Target

      b88def68bb5a317e7e356309ee8edba14fde5e2fc867bff7385e3fda024c08d6

    • Size

      4.6MB

    • MD5

      1a889f8c09b580429b1eda6843c9868d

    • SHA1

      b45133c0c3c2110ddf66c78fcbadc94513fa185b

    • SHA256

      b88def68bb5a317e7e356309ee8edba14fde5e2fc867bff7385e3fda024c08d6

    • SHA512

      f0ec08a0688d43dc1e3ce96a4fea874b9787c47b3cbbf97ab1be23c7f258039083093fc13d3bb30b9457623fa9972575c2d42557dc3b59f5ce2bb6a8f6a99afa

    • SSDEEP

      98304:mbY1qijV+n1wH8hcHGovoXMuTimi1cwetidz8w6vm22xgdc7TlJ6BSLR/u4:9J+n1w1HjvoXM+imi+htit8wP8c7ZIB8

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks