General

  • Target

    af503d0b9b166ef84a29051153ce9e24c36e0466928d47b0a9fec26e9bec3a19

  • Size

    4.9MB

  • Sample

    240620-z6n6raxelb

  • MD5

    8169c9f2327f1cf2e695ef76f349a715

  • SHA1

    89c1306d77f525bf18e96e7734ed722242dbb579

  • SHA256

    af503d0b9b166ef84a29051153ce9e24c36e0466928d47b0a9fec26e9bec3a19

  • SHA512

    a82cbef9ab2e61048cfee6b89a655a27295fe431406873785948566f1fcbaf43adc5105fe2edbe0fd303271ac3c31cb5a3e05d1cebaa008bd4af51b5e214a8c1

  • SSDEEP

    98304:mg721aYMPMJIcGcR3F7xAJhu6uGJFhAkCwea9/E4J3z9kIq+uGnFnnXlcBll:a1aCOcGsv0PueFmBwW4JDlnFnXlcBll

Malware Config

Extracted

Family

socks5systemz

C2

aqugeul.ru

bxeiamr.com

Targets

    • Target

      af503d0b9b166ef84a29051153ce9e24c36e0466928d47b0a9fec26e9bec3a19

    • Size

      4.9MB

    • MD5

      8169c9f2327f1cf2e695ef76f349a715

    • SHA1

      89c1306d77f525bf18e96e7734ed722242dbb579

    • SHA256

      af503d0b9b166ef84a29051153ce9e24c36e0466928d47b0a9fec26e9bec3a19

    • SHA512

      a82cbef9ab2e61048cfee6b89a655a27295fe431406873785948566f1fcbaf43adc5105fe2edbe0fd303271ac3c31cb5a3e05d1cebaa008bd4af51b5e214a8c1

    • SSDEEP

      98304:mg721aYMPMJIcGcR3F7xAJhu6uGJFhAkCwea9/E4J3z9kIq+uGnFnnXlcBll:a1aCOcGsv0PueFmBwW4JDlnFnXlcBll

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks