General

  • Target

    12bf868e165b87e06cdae0d614ba08902bd898d4e037a294d3149e6e3513eac2

  • Size

    5.6MB

  • Sample

    240615-ylxrqasgkd

  • MD5

    5a07736f196d6fe29f034692a8f5d1d4

  • SHA1

    850a1f657cd7cd2b6be0b7a96bd43cd58a35da18

  • SHA256

    12bf868e165b87e06cdae0d614ba08902bd898d4e037a294d3149e6e3513eac2

  • SHA512

    0542eb4ec756482f00a0f52600fd48b65cbe74143f99436a61c13650dc538a92ae14efb7bdb33880a93c4c573a3a1465484d258016033217579d9bb384fcf6d0

  • SSDEEP

    98304:m/Z535VGfNzfX7o8jlsk5Mr7aGRTGNVnbIbExdZCJjejOnyZJLJixcPgOxb0ud8:ck35srajNVxQeSnoJL8xyPG

Malware Config

Extracted

Family

socks5systemz

C2

beacdox.com

dtsgnic.info

Targets

    • Target

      12bf868e165b87e06cdae0d614ba08902bd898d4e037a294d3149e6e3513eac2

    • Size

      5.6MB

    • MD5

      5a07736f196d6fe29f034692a8f5d1d4

    • SHA1

      850a1f657cd7cd2b6be0b7a96bd43cd58a35da18

    • SHA256

      12bf868e165b87e06cdae0d614ba08902bd898d4e037a294d3149e6e3513eac2

    • SHA512

      0542eb4ec756482f00a0f52600fd48b65cbe74143f99436a61c13650dc538a92ae14efb7bdb33880a93c4c573a3a1465484d258016033217579d9bb384fcf6d0

    • SSDEEP

      98304:m/Z535VGfNzfX7o8jlsk5Mr7aGRTGNVnbIbExdZCJjejOnyZJLJixcPgOxb0ud8:ck35srajNVxQeSnoJL8xyPG

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks