General

  • Target

    c5253c7d44fc5e35445e721e76f82d6f38b73c82064ce4510d30100e31f1edb1.exe

  • Size

    4.5MB

  • Sample

    240618-w58l8atgmd

  • MD5

    2747c3bacde50a57459634c2fcf6fc81

  • SHA1

    f8acf65b114c56458eb08986ac2d5f73c69fb34a

  • SHA256

    c5253c7d44fc5e35445e721e76f82d6f38b73c82064ce4510d30100e31f1edb1

  • SHA512

    d14c26c78b23d1d18fcc98a792547f3bdda646b51497aa526a2acd368a10b377e82a14990e398c1b6e56f413ba8305169faadbf6e937cc24e4f66f8f8358d94e

  • SSDEEP

    98304:mxYru9qXnAU740GV/g061Brot9+LVorAALEcObdl2xy5TEJIV3/i7:Kv05740GtgXSr+pQJg2xyJEJcK

Malware Config

Extracted

Family

socks5systemz

C2

ccbipbx.net

ebqnugn.ua

Targets

    • Target

      c5253c7d44fc5e35445e721e76f82d6f38b73c82064ce4510d30100e31f1edb1.exe

    • Size

      4.5MB

    • MD5

      2747c3bacde50a57459634c2fcf6fc81

    • SHA1

      f8acf65b114c56458eb08986ac2d5f73c69fb34a

    • SHA256

      c5253c7d44fc5e35445e721e76f82d6f38b73c82064ce4510d30100e31f1edb1

    • SHA512

      d14c26c78b23d1d18fcc98a792547f3bdda646b51497aa526a2acd368a10b377e82a14990e398c1b6e56f413ba8305169faadbf6e937cc24e4f66f8f8358d94e

    • SSDEEP

      98304:mxYru9qXnAU740GV/g061Brot9+LVorAALEcObdl2xy5TEJIV3/i7:Kv05740GtgXSr+pQJg2xyJEJcK

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks