General

  • Target

    de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833

  • Size

    4.5MB

  • Sample

    240618-ztl6ma1app

  • MD5

    7ba0fbe5697771fa27b650273c8824fc

  • SHA1

    3737bf7b8a60f6a13fbdf627249e3369aa355730

  • SHA256

    de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833

  • SHA512

    b088b42c94ef8df3233bf6da8f6cdeeb0d666b6712644edca6ee0cd06fe4ffdb4b548a8d127e68ba6a0b833783b568f1478a0e222c630d3bcec19d7426bc54ee

  • SSDEEP

    98304:meoqEgukLFb6ZY9guhkhrJTYQy3BZK5ijs3BiT1M:+g9b6ghkXo8IA85M

Malware Config

Extracted

Family

socks5systemz

C2

aqkuwog.ru

ejtiyoe.ua

Targets

    • Target

      de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833

    • Size

      4.5MB

    • MD5

      7ba0fbe5697771fa27b650273c8824fc

    • SHA1

      3737bf7b8a60f6a13fbdf627249e3369aa355730

    • SHA256

      de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833

    • SHA512

      b088b42c94ef8df3233bf6da8f6cdeeb0d666b6712644edca6ee0cd06fe4ffdb4b548a8d127e68ba6a0b833783b568f1478a0e222c630d3bcec19d7426bc54ee

    • SSDEEP

      98304:meoqEgukLFb6ZY9guhkhrJTYQy3BZK5ijs3BiT1M:+g9b6ghkXo8IA85M

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks