General

  • Target

    9500632999f49abaa29f6189f7777a91ccbab228e984f3089f226976191e5b96

  • Size

    4.9MB

  • Sample

    240626-137z5azbrk

  • MD5

    4f87b880a42c3f911c032f276a46461a

  • SHA1

    5546225539e1a82fae19adb2241c8bddefe188dc

  • SHA256

    9500632999f49abaa29f6189f7777a91ccbab228e984f3089f226976191e5b96

  • SHA512

    009c87513664ab2ed50abc0bd0fc9c271eb78fee74e41894012a8f9d28fce66accc9d35d2866422222b1d9332e731960600778d235b3438156f3dee83d50e839

  • SSDEEP

    98304:m7uLNssc/7YrzjV+PQ4EWAhrp4ggqphEPd3ruGcrQFtgiApb3gjqQ8eEfMtj8:kuLNzc/7Y/h94Cp4gg73iGPHgrB3NQ8V

Malware Config

Extracted

Family

socks5systemz

C2

bhmqfne.com

http://bhmqfne.com/search/?q=67e28dd83f5aa4794209ff1c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978a271ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff615c3e69c9c3a

http://bhmqfne.com/search/?q=67e28dd83f5aa4794209ff1c7c27d78406abdd88be4b12eab517aa5c96bd86ef9c804c895a8bbc896c58e713bc90c91d36b5281fc235a925ed3e01d6bd974a95129070b616e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee9c9e38c4669017

bpnmelh.com

http://bpnmelh.com/search/?q=67e28dd83e55f3201607a91c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ff615c3e69c9c3b

http://bpnmelh.com/search/?q=67e28dd83e55f3201607a91c7c27d78406abdd88be4b12eab517aa5c96bd86ee918548835a8bbc896c58e713bc90c91d36b5281fc235a925ed3e5cd6bd974a95129070b616e96cc92be510b866db51b9e34eed4c2b14a82966836f23d7f210c7ee9c9e38c4669016

Targets

    • Target

      9500632999f49abaa29f6189f7777a91ccbab228e984f3089f226976191e5b96

    • Size

      4.9MB

    • MD5

      4f87b880a42c3f911c032f276a46461a

    • SHA1

      5546225539e1a82fae19adb2241c8bddefe188dc

    • SHA256

      9500632999f49abaa29f6189f7777a91ccbab228e984f3089f226976191e5b96

    • SHA512

      009c87513664ab2ed50abc0bd0fc9c271eb78fee74e41894012a8f9d28fce66accc9d35d2866422222b1d9332e731960600778d235b3438156f3dee83d50e839

    • SSDEEP

      98304:m7uLNssc/7YrzjV+PQ4EWAhrp4ggqphEPd3ruGcrQFtgiApb3gjqQ8eEfMtj8:kuLNzc/7Y/h94Cp4gg73iGPHgrB3NQ8V

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks