General

  • Target

    d478d46974e39725db3636a5b13fd187.bin

  • Size

    4.8MB

  • Sample

    240615-dfphyaxbpa

  • MD5

    0a7a87ea8747ccf8e0f1feecb2ef38b5

  • SHA1

    8546a3c41c832728d94fef2d681bdcdf38523dbb

  • SHA256

    6fac9f2de58841c21e7edb0121a30f393d084124a066dce201a1c3500a04ce76

  • SHA512

    3fb7c76d57c9ed5f81ec8de61072bc44f4a7132e5a4a21de7043c0e9bf307603b18185fc9544fa33fa4e754f0cf075a3bf256d471d0c211600a4f166a6e5402f

  • SSDEEP

    98304:LFjkoNChpuklTbvVNbpHGbtFxgNB7vFWOucdN2X3dKF3Gd/Xy/NZ7urr:L2o0IavvV5NGWTFE4QXNKF3w/C/NZa/

Malware Config

Extracted

Family

socks5systemz

C2

dlbehxl.info

bheijia.com

Targets

    • Target

      d16265882061fe6585f16a3adb40734690f19058197210ab760e084147c99cc2.exe

    • Size

      4.8MB

    • MD5

      d478d46974e39725db3636a5b13fd187

    • SHA1

      6f06919667d8d90237947017e08dc3a0573992bf

    • SHA256

      d16265882061fe6585f16a3adb40734690f19058197210ab760e084147c99cc2

    • SHA512

      dd0033d89625ea93ca041c1ee5af2be3e608d9436aa9eefc3b18faa781ce494033632eb2d4efae4bf7b104a74a882daa08eb13b1b46ba87f08f5403af5862433

    • SSDEEP

      98304:myHrESE3DEKxNsZ8pA09gDdcwLedh/yLVPRDLezS7kj:SSWg0A09sDLO/MVeS7kj

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks