General

  • Target

    3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153

  • Size

    5.9MB

  • Sample

    240617-cn5z8azcnb

  • MD5

    3107fd150626df8695083fe63b449f19

  • SHA1

    d9bb65833dd3fffd49dff8fbb800282a24329162

  • SHA256

    3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153

  • SHA512

    c1dd662aca77015694ca7c8eb8e7e045606a4954de6367801188001789d321cdd3c5a8db21f5d3965e05004f25cdbebad2b47b513cc34513c6b721b783466808

  • SSDEEP

    98304:mV/HmIUFN6ip/jqIFQNYp082I9uwE4Ox9C889LM9DL8z/D6VyHgdcG0fo2mk3xS:Q/G7FNxrmNiS54RI8z/THgdanmk3c

Malware Config

Extracted

Family

socks5systemz

C2

dlcgyte.info

ceoefkk.net

Targets

    • Target

      3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153

    • Size

      5.9MB

    • MD5

      3107fd150626df8695083fe63b449f19

    • SHA1

      d9bb65833dd3fffd49dff8fbb800282a24329162

    • SHA256

      3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153

    • SHA512

      c1dd662aca77015694ca7c8eb8e7e045606a4954de6367801188001789d321cdd3c5a8db21f5d3965e05004f25cdbebad2b47b513cc34513c6b721b783466808

    • SSDEEP

      98304:mV/HmIUFN6ip/jqIFQNYp082I9uwE4Ox9C889LM9DL8z/D6VyHgdcG0fo2mk3xS:Q/G7FNxrmNiS54RI8z/THgdanmk3c

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks