General

  • Target

    7b9f684059e6b84764f01b64c45eb828.bin

  • Size

    6.3MB

  • Sample

    240604-c6b5vsbb77

  • MD5

    b2c10e83b7c784c1a0bacf3329965357

  • SHA1

    ac6b03e87cdecd89b38c3594941aceaed2ce048a

  • SHA256

    4c07ececc0a1612cfcbc84a71e16fee89e8f333207840b03d510510bd6fc74f6

  • SHA512

    56a31080a79bab8f1d21bc6e2d280240299c9b27643dfd474348ba8f12d01af20c2a06e7415fef22edd9d42f2eeeb28c5b0bf713b46569a43a7e9d7ce79e4be1

  • SSDEEP

    196608:+sSTlc+hYPfM8NFn9Uqggr49DDMtaYITrA2:UTqhPk27N4lYaY0X

Malware Config

Targets

    • Target

      2f145aa84376fb1c39f3026a8e7fa62841188f92a7b4af0926df217347c7102f.exe

    • Size

      6.3MB

    • MD5

      7b9f684059e6b84764f01b64c45eb828

    • SHA1

      88f3aaf332bdc1ed1e6870d757b07ed9c3f47c4b

    • SHA256

      2f145aa84376fb1c39f3026a8e7fa62841188f92a7b4af0926df217347c7102f

    • SHA512

      577c5fcc9a2c9e518f7babf33d7ec951917a8d59a4dbe7ea626f9b13f6981125b00d0a94abec6a365b2eaa479ceb3dbbce0e46f6294cd1d44aeb10c6b2c649ea

    • SSDEEP

      98304:mvGoTQdSVyjcSk+o55e4sknnO03fMmazTUW5bjqvG8N/1HAJsT6sGeP14H1633i:docdSVT3PnZfVazTUuCtB1Cs1GeiVA3i

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks