General

  • Target

    a0e0bb1a640c95f9f2683c6e20a1dd53e9db886cde55b43fb5f41dadc7fd1260

  • Size

    5.1MB

  • Sample

    240627-agjgjavbpr

  • MD5

    c59b0517e295a6b8ab1601656a3a05e6

  • SHA1

    f281b41f7dea9b9e831e068bdd1dfa0e54253b30

  • SHA256

    a0e0bb1a640c95f9f2683c6e20a1dd53e9db886cde55b43fb5f41dadc7fd1260

  • SHA512

    21cfccc284d9ee0ee84919982c6c4283ce46662ebdd1c344c7fa8f54d1ded947207a49f92e37e60a834436bcbd3dc3ae11cea1bdca2b4eee7bcdeccf53a95d83

  • SSDEEP

    98304:mqgy2xhgy5qk7vM/no1bmfh83MBS+0iI/5rcdrEg2ArekVHqBuJgzw:L72xuda4o1bmW3MBrdr9RekV5Jgzw

Malware Config

Extracted

Family

socks5systemz

C2

ayrekor.ru

http://ayrekor.ru/search/?q=67e28dd86e09a721465dff1c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa44e8889b5e4fa9281ae978f771ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff615c4e894983f

http://ayrekor.ru/search/?q=67e28dd86e09a721465dff1c7c27d78406abdd88be4b12eab517aa5c96bd86e590834596148ab2865b77f80ebad9cc0f7cb63037ed2ab423a4324383ba915d911ec07bb606a0708727e40ea678c45abbe74ffb0e2807e12571c17f3e83fe16c1e6919e3ccc6d92

cesnngw.net

http://cesnngw.net/search/?q=67e28dd86459a42c4009ab4e7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f171ea771795af8e05c645db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ff615c4e894983f

http://cesnngw.net/search/?q=67e28dd86459a42c4009ab4e7c27d78406abdd88be4b12eab517aa5c96bd86ea93834896148ab2865b77f80ebad9c50f7cb63037ed2ab423a4344383ba915d911ec07bb606a0708727e40ea678c751bbe34efb0e2807e12571c17f3e83fe16c1e6919e3ccc6d92

Targets

    • Target

      a0e0bb1a640c95f9f2683c6e20a1dd53e9db886cde55b43fb5f41dadc7fd1260

    • Size

      5.1MB

    • MD5

      c59b0517e295a6b8ab1601656a3a05e6

    • SHA1

      f281b41f7dea9b9e831e068bdd1dfa0e54253b30

    • SHA256

      a0e0bb1a640c95f9f2683c6e20a1dd53e9db886cde55b43fb5f41dadc7fd1260

    • SHA512

      21cfccc284d9ee0ee84919982c6c4283ce46662ebdd1c344c7fa8f54d1ded947207a49f92e37e60a834436bcbd3dc3ae11cea1bdca2b4eee7bcdeccf53a95d83

    • SSDEEP

      98304:mqgy2xhgy5qk7vM/no1bmfh83MBS+0iI/5rcdrEg2ArekVHqBuJgzw:L72xuda4o1bmW3MBrdr9RekV5Jgzw

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks