General

  • Target

    3ec7624519c30860715016dd9187c1ccf1061a66e898dfef4a1e3d0b3e7b825a

  • Size

    4.7MB

  • Sample

    240613-2pk4watdmd

  • MD5

    39833fc501f821966d05ed7ace3de4a7

  • SHA1

    3972867512b7ade96679acd5f71ee597e4410013

  • SHA256

    3ec7624519c30860715016dd9187c1ccf1061a66e898dfef4a1e3d0b3e7b825a

  • SHA512

    b97b01166f54e90058375f0342d2d95cc6b2a417edbd7c300d1b18e9d8795a5fc68bb10ecd5673fe4d654382232fabcbf006d1ee579eefe83660b1274ba080a2

  • SSDEEP

    98304:mm9mC6PNb+odNimckOWLjq3YkdajuygQQK/MDX1787T2lK6YwjSyTPEY:VmlVXdQmcZE+3YkdauygkwXYWYwjSEv

Malware Config

Extracted

Family

socks5systemz

C2

bbthrbo.com

hkedhoi.net

csqudiq.net

ggxowvm.com

http://ggxowvm.com/search/?q=67e28dd8655bf57a4609f84c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff712c1e792933f

Targets

    • Target

      3ec7624519c30860715016dd9187c1ccf1061a66e898dfef4a1e3d0b3e7b825a

    • Size

      4.7MB

    • MD5

      39833fc501f821966d05ed7ace3de4a7

    • SHA1

      3972867512b7ade96679acd5f71ee597e4410013

    • SHA256

      3ec7624519c30860715016dd9187c1ccf1061a66e898dfef4a1e3d0b3e7b825a

    • SHA512

      b97b01166f54e90058375f0342d2d95cc6b2a417edbd7c300d1b18e9d8795a5fc68bb10ecd5673fe4d654382232fabcbf006d1ee579eefe83660b1274ba080a2

    • SSDEEP

      98304:mm9mC6PNb+odNimckOWLjq3YkdajuygQQK/MDX1787T2lK6YwjSyTPEY:VmlVXdQmcZE+3YkdauygkwXYWYwjSEv

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks