General

  • Target

    15fe8832fc196cf53d39e55099f9eff432370c2d7cc70f71a0e60a6cdf2ca300

  • Size

    4.6MB

  • Sample

    240609-kme2eaha34

  • MD5

    2cbda171c339999488815f9d581634be

  • SHA1

    e3b23a2a4895a3ba8f41f4fed3198dffb61fd915

  • SHA256

    15fe8832fc196cf53d39e55099f9eff432370c2d7cc70f71a0e60a6cdf2ca300

  • SHA512

    77b517d2a056f877c48c6515a40b58aae1a027ad45617de83805ec66dcf50ce8b2dfce91314ea4a85f347317495b2f22009f64151cf771ef2cf9ef4b8bb2db66

  • SSDEEP

    98304:mhcexmKb6Su3wHmfa0PjJX+21+UpG9zBirXfQ2AM+PU7F5:KMKb69O0rFstjirXfpoYF5

Malware Config

Extracted

Family

socks5systemz

C2

difqhev.info

http://difqhev.info/search/?q=67e28dd86c08f72b460daf4c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ee8889b5e4fa9281ae978a271ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff818c2ed93993e

http://difqhev.info/search/?q=67e28dd86c08f72b460daf4c7c27d78406abdd88be4b12eab517aa5c96bd86ec928648885a8bbc896c58e713bc90c91b36b5281fc235a925ed3e01d6bd974a95129070b616e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee929339cf699513

ccexuye.net

http://ccexuye.net/search/?q=67e28dd8645cf52d405fae1d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a071ea771795af8e05c645db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ff818c2ed93993d

http://ccexuye.net/search/?q=67e28dd8645cf52d405fae1d7c27d78406abdd88be4b12eab517aa5c96bd86ec9d8f45895a8bbc896c58e713bc90c91936b5281fc235a925ed3e03d6bd974a95129070b616e96cc92be510b866db51b9e34eed4c2b14a82966836f23d7f210c7ee929339cf699510

Targets

    • Target

      15fe8832fc196cf53d39e55099f9eff432370c2d7cc70f71a0e60a6cdf2ca300

    • Size

      4.6MB

    • MD5

      2cbda171c339999488815f9d581634be

    • SHA1

      e3b23a2a4895a3ba8f41f4fed3198dffb61fd915

    • SHA256

      15fe8832fc196cf53d39e55099f9eff432370c2d7cc70f71a0e60a6cdf2ca300

    • SHA512

      77b517d2a056f877c48c6515a40b58aae1a027ad45617de83805ec66dcf50ce8b2dfce91314ea4a85f347317495b2f22009f64151cf771ef2cf9ef4b8bb2db66

    • SSDEEP

      98304:mhcexmKb6Su3wHmfa0PjJX+21+UpG9zBirXfQ2AM+PU7F5:KMKb69O0rFstjirXfpoYF5

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks