General

  • Target

    e61eba0e66668bc3b952e9abfa32dfbc1276499ca0e3702e8dad543fd7753520

  • Size

    6.3MB

  • Sample

    240602-clgvlsfc8s

  • MD5

    04dff01c17bab39b7bd400ef33dac0a0

  • SHA1

    49855b3a220c1359d9baf560fcf0b8924802d66c

  • SHA256

    e61eba0e66668bc3b952e9abfa32dfbc1276499ca0e3702e8dad543fd7753520

  • SHA512

    f14a3ade70254546188c91af7d0b536196d80ef6199403adcc6de4da2f76debe26cb65bf68f76e29bbc235436370e69f3224d7f1bc59cbb8a862ef7dbd768798

  • SSDEEP

    98304:m1AmXQKllbRozZTqg1HhWRAExJXGkojobVOreu3JQaWn46cuimyTaEH2jiqnuGbg:Zd63WHhWqCXPoju493bWnCu7QZxOwqMJ

Malware Config

Targets

    • Target

      e61eba0e66668bc3b952e9abfa32dfbc1276499ca0e3702e8dad543fd7753520

    • Size

      6.3MB

    • MD5

      04dff01c17bab39b7bd400ef33dac0a0

    • SHA1

      49855b3a220c1359d9baf560fcf0b8924802d66c

    • SHA256

      e61eba0e66668bc3b952e9abfa32dfbc1276499ca0e3702e8dad543fd7753520

    • SHA512

      f14a3ade70254546188c91af7d0b536196d80ef6199403adcc6de4da2f76debe26cb65bf68f76e29bbc235436370e69f3224d7f1bc59cbb8a862ef7dbd768798

    • SSDEEP

      98304:m1AmXQKllbRozZTqg1HhWRAExJXGkojobVOreu3JQaWn46cuimyTaEH2jiqnuGbg:Zd63WHhWqCXPoju493bWnCu7QZxOwqMJ

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks