General

  • Target

    238104b176dfcd0f9f7cc4e31b48532b791a05aeeb3476e39ee6cc4a11f4be06

  • Size

    4.8MB

  • Sample

    240617-fn5agavhmf

  • MD5

    4f7e4b35479a942e662355c8e2e6add6

  • SHA1

    388a3f5f5221929058b545742546a1fe15f1978f

  • SHA256

    238104b176dfcd0f9f7cc4e31b48532b791a05aeeb3476e39ee6cc4a11f4be06

  • SHA512

    9be7b1c80d649feb86572829a309fca54ada22cb706ca3e932c27c2f5c02afdf8bf35235c7d976eaa0e4e0fdd28e6623a26c14fef52503823327f0ad23cec514

  • SSDEEP

    98304:mee/xuovuJhRtfUoMpxe4VPGfiqcZtGqxFRt07AVlleRZ1m/VRad:E/IoWJyrBP0y//RtfVls9m/zad

Malware Config

Extracted

Family

socks5systemz

C2

bfzurbq.com

http://bfzurbq.com/search/?q=67e28dd86a5ef62a130aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a771ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a6f88ff11c5e693

bvjtbpz.com

http://bvjtbpz.com/search/?q=67e28dd86809f27b415ba51b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa1de8889b5e4fa9281ae978a771ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff717c0ef909338

Targets

    • Target

      238104b176dfcd0f9f7cc4e31b48532b791a05aeeb3476e39ee6cc4a11f4be06

    • Size

      4.8MB

    • MD5

      4f7e4b35479a942e662355c8e2e6add6

    • SHA1

      388a3f5f5221929058b545742546a1fe15f1978f

    • SHA256

      238104b176dfcd0f9f7cc4e31b48532b791a05aeeb3476e39ee6cc4a11f4be06

    • SHA512

      9be7b1c80d649feb86572829a309fca54ada22cb706ca3e932c27c2f5c02afdf8bf35235c7d976eaa0e4e0fdd28e6623a26c14fef52503823327f0ad23cec514

    • SSDEEP

      98304:mee/xuovuJhRtfUoMpxe4VPGfiqcZtGqxFRt07AVlleRZ1m/VRad:E/IoWJyrBP0y//RtfVls9m/zad

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks