General

  • Target

    d16265882061fe6585f16a3adb40734690f19058197210ab760e084147c99cc2.exe

  • Size

    4.8MB

  • Sample

    240614-cen1cavdnr

  • MD5

    d478d46974e39725db3636a5b13fd187

  • SHA1

    6f06919667d8d90237947017e08dc3a0573992bf

  • SHA256

    d16265882061fe6585f16a3adb40734690f19058197210ab760e084147c99cc2

  • SHA512

    dd0033d89625ea93ca041c1ee5af2be3e608d9436aa9eefc3b18faa781ce494033632eb2d4efae4bf7b104a74a882daa08eb13b1b46ba87f08f5403af5862433

  • SSDEEP

    98304:myHrESE3DEKxNsZ8pA09gDdcwLedh/yLVPRDLezS7kj:SSWg0A09sDLO/MVeS7kj

Malware Config

Extracted

Family

socks5systemz

C2

ckhnqss.net

ccpbqoa.net

Targets

    • Target

      d16265882061fe6585f16a3adb40734690f19058197210ab760e084147c99cc2.exe

    • Size

      4.8MB

    • MD5

      d478d46974e39725db3636a5b13fd187

    • SHA1

      6f06919667d8d90237947017e08dc3a0573992bf

    • SHA256

      d16265882061fe6585f16a3adb40734690f19058197210ab760e084147c99cc2

    • SHA512

      dd0033d89625ea93ca041c1ee5af2be3e608d9436aa9eefc3b18faa781ce494033632eb2d4efae4bf7b104a74a882daa08eb13b1b46ba87f08f5403af5862433

    • SSDEEP

      98304:myHrESE3DEKxNsZ8pA09gDdcwLedh/yLVPRDLezS7kj:SSWg0A09sDLO/MVeS7kj

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Detects executables packed with VMProtect.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks