General

  • Target

    f5dfbe86b4f129b1744c1ee7d900959d9ac0694b25f7a11f7ff388727f3d7554

  • Size

    4.8MB

  • Sample

    240613-3xrr3azenj

  • MD5

    8f4cbb79fd1e48361807ca359c4a26d4

  • SHA1

    1ec3abd8abe11fb3955489b937cddcfe1c3d6e0d

  • SHA256

    f5dfbe86b4f129b1744c1ee7d900959d9ac0694b25f7a11f7ff388727f3d7554

  • SHA512

    b4a25bf4b15011869fabead8f052f82f8fda3672f991f598fda38d63e0407e0601df755a61e2760be85b95d3ded26d31cb67776d66299ca320dfc70bb522bd64

  • SSDEEP

    98304:mBABmsd8zKFJTPC8kLKcgKSfRFFfEYMQxxYUKJ8xVNCDBIBXgaYorO/9q1e:NziyJTP7cgKKRFFfDDxRKJwV8BIBQJi2

Malware Config

Extracted

Family

socks5systemz

C2

aqbwvzi.ru

aivkbjg.ru

Targets

    • Target

      f5dfbe86b4f129b1744c1ee7d900959d9ac0694b25f7a11f7ff388727f3d7554

    • Size

      4.8MB

    • MD5

      8f4cbb79fd1e48361807ca359c4a26d4

    • SHA1

      1ec3abd8abe11fb3955489b937cddcfe1c3d6e0d

    • SHA256

      f5dfbe86b4f129b1744c1ee7d900959d9ac0694b25f7a11f7ff388727f3d7554

    • SHA512

      b4a25bf4b15011869fabead8f052f82f8fda3672f991f598fda38d63e0407e0601df755a61e2760be85b95d3ded26d31cb67776d66299ca320dfc70bb522bd64

    • SSDEEP

      98304:mBABmsd8zKFJTPC8kLKcgKSfRFFfEYMQxxYUKJ8xVNCDBIBXgaYorO/9q1e:NziyJTP7cgKKRFFfDDxRKJwV8BIBQJi2

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks