General

  • Target

    676ed3db8c8105fb046ca8ff0b63619a38a5dd56fb1bf459aecd0e196cdad2ce

  • Size

    4.4MB

  • Sample

    240620-2rq3xa1eja

  • MD5

    d35fd7b2286f0581c14a33f93061a62a

  • SHA1

    4c24b14fe42c846ff66e5ab49229c97be43a622a

  • SHA256

    676ed3db8c8105fb046ca8ff0b63619a38a5dd56fb1bf459aecd0e196cdad2ce

  • SHA512

    f48c4ac80256ef8c7db529462c784f42fcd124c23406faf04405896b262e028f4777ed675789611f8bfd07f06707937758eaa8452093dc527a80e10f0931ca59

  • SSDEEP

    98304:mjTsTwihU+5HyVT20HiY93VOm9AZfQt8DU8ujRapKvC29ZGADiMI:lHyVfCO4eAZfif8uFoKv59Pix

Malware Config

Extracted

Family

socks5systemz

C2

ejebfev.ua

itvepgc.info

bbxfuxz.com

http://bbxfuxz.com/search/?q=67e28dd86d5ff028450dff177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f571ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff718c2ec9d9b3c

Targets

    • Target

      676ed3db8c8105fb046ca8ff0b63619a38a5dd56fb1bf459aecd0e196cdad2ce

    • Size

      4.4MB

    • MD5

      d35fd7b2286f0581c14a33f93061a62a

    • SHA1

      4c24b14fe42c846ff66e5ab49229c97be43a622a

    • SHA256

      676ed3db8c8105fb046ca8ff0b63619a38a5dd56fb1bf459aecd0e196cdad2ce

    • SHA512

      f48c4ac80256ef8c7db529462c784f42fcd124c23406faf04405896b262e028f4777ed675789611f8bfd07f06707937758eaa8452093dc527a80e10f0931ca59

    • SSDEEP

      98304:mjTsTwihU+5HyVT20HiY93VOm9AZfQt8DU8ujRapKvC29ZGADiMI:lHyVfCO4eAZfif8uFoKv59Pix

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks