General

  • Target

    0a9d34bcfad506b0bea7a71da5e45b4a91a41e88ab0de4a85976810d8965750c

  • Size

    5.0MB

  • Sample

    240614-jkx9javaqn

  • MD5

    1d404808fddb8e8f3638ea73a0b57326

  • SHA1

    6297936dc0638cc67f7938550f3c9e1f4c3c1ca4

  • SHA256

    0a9d34bcfad506b0bea7a71da5e45b4a91a41e88ab0de4a85976810d8965750c

  • SHA512

    61ad3eb223fa845c1abcf2cb12559c6fb2982973a9e93ba2c6fd621f6bed1059f197246365d9ad93a7c2221925a40fc4c0e97b1a9c8cdc200897441f28b00350

  • SSDEEP

    98304:mAIX91XtzekTgvUzIKwr0ZUJcrsAACl3RQHr9pITBw/mw74KhIu:tIXntz1gvyB7lWCCzUp2nIu

Malware Config

Extracted

Family

socks5systemz

C2

bddeeih.com

Targets

    • Target

      0a9d34bcfad506b0bea7a71da5e45b4a91a41e88ab0de4a85976810d8965750c

    • Size

      5.0MB

    • MD5

      1d404808fddb8e8f3638ea73a0b57326

    • SHA1

      6297936dc0638cc67f7938550f3c9e1f4c3c1ca4

    • SHA256

      0a9d34bcfad506b0bea7a71da5e45b4a91a41e88ab0de4a85976810d8965750c

    • SHA512

      61ad3eb223fa845c1abcf2cb12559c6fb2982973a9e93ba2c6fd621f6bed1059f197246365d9ad93a7c2221925a40fc4c0e97b1a9c8cdc200897441f28b00350

    • SSDEEP

      98304:mAIX91XtzekTgvUzIKwr0ZUJcrsAACl3RQHr9pITBw/mw74KhIu:tIXntz1gvyB7lWCCzUp2nIu

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks