General

  • Target

    c7f269530aac06901c11c689ff5902ff.exe

  • Size

    6.6MB

  • Sample

    240601-t1cymshc96

  • MD5

    c7f269530aac06901c11c689ff5902ff

  • SHA1

    7525944a775e54cd7b8a7b6a36415cbb17cc72d6

  • SHA256

    fe66709abfc8ebc81d937807326ec8919af8da242aac4c76562a98011c239929

  • SHA512

    1a2329c50666a81f594e9239795afefb9ece537a83326a80b15c4daf8af565b96c30c792938eb0d4836dc4a888fd60010c922bf00570776d47472f53492f4830

  • SSDEEP

    196608:p0JwFa7+qvAq++YsoRxwNOfaHRn9+eoPOMO9CgT9v:pFA+qQhRxwsfaHVg/POM8d

Malware Config

Targets

    • Target

      c7f269530aac06901c11c689ff5902ff.exe

    • Size

      6.6MB

    • MD5

      c7f269530aac06901c11c689ff5902ff

    • SHA1

      7525944a775e54cd7b8a7b6a36415cbb17cc72d6

    • SHA256

      fe66709abfc8ebc81d937807326ec8919af8da242aac4c76562a98011c239929

    • SHA512

      1a2329c50666a81f594e9239795afefb9ece537a83326a80b15c4daf8af565b96c30c792938eb0d4836dc4a888fd60010c922bf00570776d47472f53492f4830

    • SSDEEP

      196608:p0JwFa7+qvAq++YsoRxwNOfaHRn9+eoPOMO9CgT9v:pFA+qQhRxwsfaHVg/POM8d

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks