General

  • Target

    b8f5a15fe091851a9507eac3cab254b511e693363264b0ad2147ebb7de5a0995

  • Size

    4.8MB

  • Sample

    240613-3xe39swenb

  • MD5

    3c211e347090930efc5840d9c261369a

  • SHA1

    e6b75f2990d369a55456a921f7c11e8bf3ddefb6

  • SHA256

    b8f5a15fe091851a9507eac3cab254b511e693363264b0ad2147ebb7de5a0995

  • SHA512

    10b2a82f67ca3811181edd8b261c6ef6e231d924f32e2ed2756cebc9a6569f04840dc6947dc11a9bf45f9b759a8ccd9217e7802eae1f2729579c855dd06c31c0

  • SSDEEP

    98304:mMub1ialpsbm1SuulMaUWKH9sPWnkrSndM36v/+WNibfvQ0:khpRdjXlHSPykrSntBNibf9

Malware Config

Extracted

Family

socks5systemz

C2

bovpbds.com

kzgecyp.ua

csqiqvk.net

http://csqiqvk.net/search/?q=67e28dd8655bf57a4609f84c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff712c2ed9d9c33

Targets

    • Target

      b8f5a15fe091851a9507eac3cab254b511e693363264b0ad2147ebb7de5a0995

    • Size

      4.8MB

    • MD5

      3c211e347090930efc5840d9c261369a

    • SHA1

      e6b75f2990d369a55456a921f7c11e8bf3ddefb6

    • SHA256

      b8f5a15fe091851a9507eac3cab254b511e693363264b0ad2147ebb7de5a0995

    • SHA512

      10b2a82f67ca3811181edd8b261c6ef6e231d924f32e2ed2756cebc9a6569f04840dc6947dc11a9bf45f9b759a8ccd9217e7802eae1f2729579c855dd06c31c0

    • SSDEEP

      98304:mMub1ialpsbm1SuulMaUWKH9sPWnkrSndM36v/+WNibfvQ0:khpRdjXlHSPykrSntBNibf9

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks