General

  • Target

    ddcee3e985d92b3b298af4ec15baf7dcb1a4b71d03b062557bd384c15b18ca0d

  • Size

    5.8MB

  • Sample

    240615-kw7ssavcmc

  • MD5

    20a18da1285d9a2224fc6335f821b7c7

  • SHA1

    598ca4556823ee5c5d260a07a8f15bc1b3e9b6bb

  • SHA256

    ddcee3e985d92b3b298af4ec15baf7dcb1a4b71d03b062557bd384c15b18ca0d

  • SHA512

    1dbf9051b52ddf72f055e2bfe89c7d61fb24e8e16baf85099f1d0f68e81d217885ab8be6b8ad5465f9913b44b440275eab596ad28f4049de8b260e6fcacf04d7

  • SSDEEP

    98304:mJ3Xq9jXW5Sv2Zw1zWmJ2rql9gpuXzi2KcfTX8Q/Pl5LxGI6bqiOdyTvvTyC:83Xq12ZQmrqlOMXm2KcrXlHl5LgIoqiD

Malware Config

Extracted

Family

socks5systemz

C2

ccowdsd.net

http://ccowdsd.net/search/?q=67e28dd83f08f52f150eab187c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ae8889b5e4fa9281ae978f471ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff715c4ee9c9f3f

http://ccowdsd.net/search/?q=67e28dd83f08f52f150eab187c27d78406abdd88be4b12eab517aa5c96bd86e890834e96148ab2865b77f80ebad9c20f7cb63037ed2ab423a4314383ba915d911ec07bb606a0708727e40ea678c45abbe74ffb0e2807e12571c17f3e83fe16c1e7919e3ac46a92

bnyzxhq.com

http://bnyzxhq.com/search/?q=67e28dd83f0fa67d125ca51e7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa1de8889b5e4fa9281ae978f371ea771795af8e05c645db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ff715c4ee9c9f38

http://bnyzxhq.com/search/?q=67e28dd83f0fa67d125ca51e7c27d78406abdd88be4b12eab517aa5c96bd86e59d8e4896148ab2865b77f80ebad9950f7cb63037ed2ab423a4364383ba915d911ec07bb606a0708727e40ea678c751bbe34efb0e2807e12571c17f3e83fe16c1e7919e3ac46a95

Targets

    • Target

      ddcee3e985d92b3b298af4ec15baf7dcb1a4b71d03b062557bd384c15b18ca0d

    • Size

      5.8MB

    • MD5

      20a18da1285d9a2224fc6335f821b7c7

    • SHA1

      598ca4556823ee5c5d260a07a8f15bc1b3e9b6bb

    • SHA256

      ddcee3e985d92b3b298af4ec15baf7dcb1a4b71d03b062557bd384c15b18ca0d

    • SHA512

      1dbf9051b52ddf72f055e2bfe89c7d61fb24e8e16baf85099f1d0f68e81d217885ab8be6b8ad5465f9913b44b440275eab596ad28f4049de8b260e6fcacf04d7

    • SSDEEP

      98304:mJ3Xq9jXW5Sv2Zw1zWmJ2rql9gpuXzi2KcfTX8Q/Pl5LxGI6bqiOdyTvvTyC:83Xq12ZQmrqlOMXm2KcrXlHl5LgIoqiD

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks