General

  • Target

    a576c3b4fc0211b297912c9f595580095e299dcda22de1a2585d768319dc7f5e

  • Size

    4.9MB

  • Sample

    240626-f7n3lazhmn

  • MD5

    4eb67810b09f04f349382ca45534358a

  • SHA1

    8bd40b1e5afbd75961f3d5bc2a6615ba0dd2c74d

  • SHA256

    a576c3b4fc0211b297912c9f595580095e299dcda22de1a2585d768319dc7f5e

  • SHA512

    855df019e8153360a5cd9d27d7e9d7755c50136d89c853c2dbc0fcc975b9fd7d42e3509db46b4ef902858f42530624d1d7be7796c5e6b99a913afebed0bd4c65

  • SSDEEP

    98304:mnAyorz139xZd7M4Q86rF/T6HQcEorcIsiZkQz9M3QQfbYNF/aB/mEPTR7:uixZlx6rkQ9KLSJfOwMcR7

Malware Config

Extracted

Family

socks5systemz

C2

ebegxbh.ua

http://ebegxbh.ua/search/?q=67e28dd83e0bfb2e455aa5187c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ae8889b5e4fa9281ae978f171ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff612c7e69c983d

http://ebegxbh.ua/search/?q=67e28dd83e0bfb2e455aa5187c27d78406abdd88be4b12eab517aa5c96bd86ef9c814e855a8bbc896c58e713bc90c91f36b5281fc235a925ed3e52d6bd974a95129070b616e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee9c993cc4669410

ccxbblr.net

http://ccxbblr.net/search/?q=67e28dd83d0ea428165baf167c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a371ea771795af8e05c645db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ff612c7e69c983d

http://ccxbblr.net/search/?q=67e28dd83d0ea428165baf167c27d78406abdd88be4b12eab517aa5c96bd86ea92834496148ab2865b77f80ebad9c40f7cb63037ed2ab423a4664383ba915d911ec07bb606a0708727e40ea678c751bbe34efb0e2807e12571c17f3e83fe16c1e6969d32c46d90

Targets

    • Target

      a576c3b4fc0211b297912c9f595580095e299dcda22de1a2585d768319dc7f5e

    • Size

      4.9MB

    • MD5

      4eb67810b09f04f349382ca45534358a

    • SHA1

      8bd40b1e5afbd75961f3d5bc2a6615ba0dd2c74d

    • SHA256

      a576c3b4fc0211b297912c9f595580095e299dcda22de1a2585d768319dc7f5e

    • SHA512

      855df019e8153360a5cd9d27d7e9d7755c50136d89c853c2dbc0fcc975b9fd7d42e3509db46b4ef902858f42530624d1d7be7796c5e6b99a913afebed0bd4c65

    • SSDEEP

      98304:mnAyorz139xZd7M4Q86rF/T6HQcEorcIsiZkQz9M3QQfbYNF/aB/mEPTR7:uixZlx6rkQ9KLSJfOwMcR7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks