General

  • Target

    bbc137e2faad69112caff067b1661539be3c9bdeac81044cd531f5bfe3f0883c

  • Size

    6.1MB

  • Sample

    240604-kfkcjsah6v

  • MD5

    c0003f5334845b5ac61f353f711f84ad

  • SHA1

    c4903adfded77fd5cb673bdd0ddd82acfc35a31d

  • SHA256

    bbc137e2faad69112caff067b1661539be3c9bdeac81044cd531f5bfe3f0883c

  • SHA512

    205fc95ce47f6588ea4aa5d5d45c33fc0cac5cc3f278017e36875ef138b26c8faf02ece2b636bd506b05f2a66b54761c2d69c041a7e3009cc83b98b18acc5997

  • SSDEEP

    196608:9olc8dn7Lw31otp3LHnxeaFuKxn0q1qwSnZbfRrhh:58ho34VLHnxea8Ktxq/npRrz

Malware Config

Targets

    • Target

      bbc137e2faad69112caff067b1661539be3c9bdeac81044cd531f5bfe3f0883c

    • Size

      6.1MB

    • MD5

      c0003f5334845b5ac61f353f711f84ad

    • SHA1

      c4903adfded77fd5cb673bdd0ddd82acfc35a31d

    • SHA256

      bbc137e2faad69112caff067b1661539be3c9bdeac81044cd531f5bfe3f0883c

    • SHA512

      205fc95ce47f6588ea4aa5d5d45c33fc0cac5cc3f278017e36875ef138b26c8faf02ece2b636bd506b05f2a66b54761c2d69c041a7e3009cc83b98b18acc5997

    • SSDEEP

      196608:9olc8dn7Lw31otp3LHnxeaFuKxn0q1qwSnZbfRrhh:58ho34VLHnxea8Ktxq/npRrz

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks