General

  • Target

    605d56512b64aead07b89d7cd21c65c50398f419545bd056bc924d00a85b3814

  • Size

    4.7MB

  • Sample

    240611-gt1pxaxfkp

  • MD5

    51483237cb9a2038f9432bfcc67f87e4

  • SHA1

    a501500e17e91f1b3e3818ef6997290a2d54de07

  • SHA256

    605d56512b64aead07b89d7cd21c65c50398f419545bd056bc924d00a85b3814

  • SHA512

    344e105e817f7e777c067f5694d75d80d61809ec8175785e3318c666fd58761e69fd21fac8778c761d44b15d40991c78ffb2a266950beb00baaeb6e6eada4c20

  • SSDEEP

    98304:mXXIq6nxhy4Pv5RoJ14a6ZqncBfpNlwkYuMG08os05SURBdcNuw:C0xVvsJMquN6kYuM8URBd6uw

Malware Config

Extracted

Family

socks5systemz

C2

bnrpbjh.com

bfuzrbc.com

Targets

    • Target

      605d56512b64aead07b89d7cd21c65c50398f419545bd056bc924d00a85b3814

    • Size

      4.7MB

    • MD5

      51483237cb9a2038f9432bfcc67f87e4

    • SHA1

      a501500e17e91f1b3e3818ef6997290a2d54de07

    • SHA256

      605d56512b64aead07b89d7cd21c65c50398f419545bd056bc924d00a85b3814

    • SHA512

      344e105e817f7e777c067f5694d75d80d61809ec8175785e3318c666fd58761e69fd21fac8778c761d44b15d40991c78ffb2a266950beb00baaeb6e6eada4c20

    • SSDEEP

      98304:mXXIq6nxhy4Pv5RoJ14a6ZqncBfpNlwkYuMG08os05SURBdcNuw:C0xVvsJMquN6kYuM8URBd6uw

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks