General

  • Target

    748acf5e2d770b17c35d1d5643ede9ab1c3a147f65b13dd00ed32fe0bc8c7de0.exe

  • Size

    4.7MB

  • Sample

    240612-b1fqesxhlh

  • MD5

    6dc45db689c80230256d5b02a5be2cfd

  • SHA1

    15a4d6ef2805dc4002fc53f98f739234e211ace1

  • SHA256

    748acf5e2d770b17c35d1d5643ede9ab1c3a147f65b13dd00ed32fe0bc8c7de0

  • SHA512

    593205cc2690644c0bf7ce843b5866cc4cee1ba3b783dc517c9b558735a9dcbe07cbd72f84106d908414d3819f36f168aa94848e442e5259befd3f07de29bbd2

  • SSDEEP

    98304:mrHHLcMZHeE8CHn5KMl3YZCN2lXCfb/j5BDEIjCFox:srcSB5642BCLjPoFc

Malware Config

Extracted

Family

socks5systemz

C2

csnwoud.net

dtaubwb.info

Targets

    • Target

      748acf5e2d770b17c35d1d5643ede9ab1c3a147f65b13dd00ed32fe0bc8c7de0.exe

    • Size

      4.7MB

    • MD5

      6dc45db689c80230256d5b02a5be2cfd

    • SHA1

      15a4d6ef2805dc4002fc53f98f739234e211ace1

    • SHA256

      748acf5e2d770b17c35d1d5643ede9ab1c3a147f65b13dd00ed32fe0bc8c7de0

    • SHA512

      593205cc2690644c0bf7ce843b5866cc4cee1ba3b783dc517c9b558735a9dcbe07cbd72f84106d908414d3819f36f168aa94848e442e5259befd3f07de29bbd2

    • SSDEEP

      98304:mrHHLcMZHeE8CHn5KMl3YZCN2lXCfb/j5BDEIjCFox:srcSB5642BCLjPoFc

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Detects executables packed with VMProtect.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks