General

  • Target

    51c6153e9d3050375ceff05719a843dbaa4780eb57703ebbfc83e7fd8d04f9b5

  • Size

    4.5MB

  • Sample

    240620-2pwwdavfjq

  • MD5

    b7da5cb989f005d98378ac072cd2bda6

  • SHA1

    9f90d0455ed66a841b2233ff5ff6a6f494774d87

  • SHA256

    51c6153e9d3050375ceff05719a843dbaa4780eb57703ebbfc83e7fd8d04f9b5

  • SHA512

    95643521f18cc01eaa4667c17c1603910507408424e59d54c33b17ad2c0ad302819b1a657e1a8788df029014da86b5db894b8f9d54f7324686856d6dcbafafa4

  • SSDEEP

    98304:mrKXFSqhRWdNJ1naJ5HZZf8P0k8JpmrTIionzVntPFj1QAvU2Zd7:qKIqzeNQlZ58P0k8uTItBtPFr5

Malware Config

Extracted

Family

socks5systemz

C2

bmefbsb.com

http://bmefbsb.com/search/?q=67e28dd86a5ba0284308f94b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f071ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a6f87fd12c6ed92

buukkum.com

http://buukkum.com/search/?q=67e28dd86d5ff028450dff177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f571ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff718c2ec93983f

Targets

    • Target

      51c6153e9d3050375ceff05719a843dbaa4780eb57703ebbfc83e7fd8d04f9b5

    • Size

      4.5MB

    • MD5

      b7da5cb989f005d98378ac072cd2bda6

    • SHA1

      9f90d0455ed66a841b2233ff5ff6a6f494774d87

    • SHA256

      51c6153e9d3050375ceff05719a843dbaa4780eb57703ebbfc83e7fd8d04f9b5

    • SHA512

      95643521f18cc01eaa4667c17c1603910507408424e59d54c33b17ad2c0ad302819b1a657e1a8788df029014da86b5db894b8f9d54f7324686856d6dcbafafa4

    • SSDEEP

      98304:mrKXFSqhRWdNJ1naJ5HZZf8P0k8JpmrTIionzVntPFj1QAvU2Zd7:qKIqzeNQlZ58P0k8uTItBtPFr5

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks