General

  • Target

    f7601a7c78095aac6823849865ffa590147eea1c8105fb80e7ad922704cc6957

  • Size

    5.4MB

  • Sample

    240624-gp398syfrb

  • MD5

    fc94883b6916897050bc9abe807949da

  • SHA1

    6e182593d47cf5c7800a20c37988c2be9923b74d

  • SHA256

    f7601a7c78095aac6823849865ffa590147eea1c8105fb80e7ad922704cc6957

  • SHA512

    a629708bd94fa30382f690e6803392f7a8b09f994b42baf0c3c2916dd25f93ce9445bdea2c729bcfe8fc1d3c2e02448751b447d2a595a856609073dc1634ac73

  • SSDEEP

    98304:mHx7fpSGkDoPdIAnOLFTwDhyzpyXiJWc/4WHcZAvUqJmSgyNhJ3oYey9G38:ax7hgDo1T4TSyzIDG44cZMBgJrwG38

Malware Config

Extracted

Family

socks5systemz

C2

cklozze.net

jobgeix.info

cceynzl.net

http://cceynzl.net/search/?q=67e28dd8685af379125bfd4e7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa49e8889b5e4fa9281ae978f271ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff613c0e79d9e3c

Targets

    • Target

      f7601a7c78095aac6823849865ffa590147eea1c8105fb80e7ad922704cc6957

    • Size

      5.4MB

    • MD5

      fc94883b6916897050bc9abe807949da

    • SHA1

      6e182593d47cf5c7800a20c37988c2be9923b74d

    • SHA256

      f7601a7c78095aac6823849865ffa590147eea1c8105fb80e7ad922704cc6957

    • SHA512

      a629708bd94fa30382f690e6803392f7a8b09f994b42baf0c3c2916dd25f93ce9445bdea2c729bcfe8fc1d3c2e02448751b447d2a595a856609073dc1634ac73

    • SSDEEP

      98304:mHx7fpSGkDoPdIAnOLFTwDhyzpyXiJWc/4WHcZAvUqJmSgyNhJ3oYey9G38:ax7hgDo1T4TSyzIDG44cZMBgJrwG38

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks