General

  • Target

    3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339.exe

  • Size

    4.9MB

  • Sample

    240614-bjbp5ssgnp

  • MD5

    a0beeee56cf28926d870b5b4c11bd74d

  • SHA1

    97046dd1c0581f774179be4abfa5e337f848b20c

  • SHA256

    3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339

  • SHA512

    07e916601ac31b914cede30130500032ef380120c18a97a5f32bbd7bd40992f5c151ded1fb1bda43913248c4e4ea7eec9673c361dfd6ec972299d659b98b5a7c

  • SSDEEP

    98304:m1Tl9IFMASPUrPJwXax8bFbmyRvpCrvEdwlXfRdAITlfhln24LOMzG9jv4kOFCe:2TcFM78qkAFbvVdqPR+ITlfrdSMa9jv0

Malware Config

Extracted

Family

socks5systemz

C2

bxnejkv.com

bptoiod.com

Targets

    • Target

      3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339.exe

    • Size

      4.9MB

    • MD5

      a0beeee56cf28926d870b5b4c11bd74d

    • SHA1

      97046dd1c0581f774179be4abfa5e337f848b20c

    • SHA256

      3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339

    • SHA512

      07e916601ac31b914cede30130500032ef380120c18a97a5f32bbd7bd40992f5c151ded1fb1bda43913248c4e4ea7eec9673c361dfd6ec972299d659b98b5a7c

    • SSDEEP

      98304:m1Tl9IFMASPUrPJwXax8bFbmyRvpCrvEdwlXfRdAITlfhln24LOMzG9jv4kOFCe:2TcFM78qkAFbvVdqPR+ITlfrdSMa9jv0

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Detects executables packed with VMProtect.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks