General

  • Target

    7b31b41c6c95ce8a5ded7fb9f342cd95986d5503232e3ab4ecc26dceb8d2998a

  • Size

    6.2MB

  • Sample

    240603-smxkfsae9s

  • MD5

    fbba8a5b393323c4e07776e7f9e53761

  • SHA1

    df318c97915b68334dd1222fbf663017b1d483b0

  • SHA256

    7b31b41c6c95ce8a5ded7fb9f342cd95986d5503232e3ab4ecc26dceb8d2998a

  • SHA512

    afa15ea70c7ed1d75c0a23543347e6bfc2311af4fc229b9bf0573102ef5c8b7e5bdfbee937f94c942d0c14926305f358dd3d9e4809733d34c8abb9b09d6464db

  • SSDEEP

    196608:cZHkPTcNaWZvDvEiUevQrS3oFsU/NZ2skDBf+:tUaWZDvemQ24FsmNZoBf+

Malware Config

Targets

    • Target

      7b31b41c6c95ce8a5ded7fb9f342cd95986d5503232e3ab4ecc26dceb8d2998a

    • Size

      6.2MB

    • MD5

      fbba8a5b393323c4e07776e7f9e53761

    • SHA1

      df318c97915b68334dd1222fbf663017b1d483b0

    • SHA256

      7b31b41c6c95ce8a5ded7fb9f342cd95986d5503232e3ab4ecc26dceb8d2998a

    • SHA512

      afa15ea70c7ed1d75c0a23543347e6bfc2311af4fc229b9bf0573102ef5c8b7e5bdfbee937f94c942d0c14926305f358dd3d9e4809733d34c8abb9b09d6464db

    • SSDEEP

      196608:cZHkPTcNaWZvDvEiUevQrS3oFsU/NZ2skDBf+:tUaWZDvemQ24FsmNZoBf+

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks