General

  • Target

    fb7ecd1de3f4b84286e42fb834ee3af497af3dc674555351a1f755d3f1977cfd

  • Size

    5.1MB

  • Sample

    240708-fr4hcatell

  • MD5

    eeefe3a2e976b1c5e04a5f0fd14e828b

  • SHA1

    b8419e6061490bb45eef0545abade250c71ffc32

  • SHA256

    fb7ecd1de3f4b84286e42fb834ee3af497af3dc674555351a1f755d3f1977cfd

  • SHA512

    0930124e4bb637cbb533785a5d1df7d6cb9720942023e84ba33fe49b8d2a04871e49a7c160950ddd37119ae8697742c8796b456c6f27c60e1702f0a3f7987959

  • SSDEEP

    98304:Cbt5S639OUs4KK/soh6crW1iWM7zDgbvtUhhtgg8p/4l7yz5jdBtu/Z82qX/dgr3:k33UUsK/WM73gbvmggJ72nA/S5d2QI

Malware Config

Targets

    • Target

      fb7ecd1de3f4b84286e42fb834ee3af497af3dc674555351a1f755d3f1977cfd

    • Size

      5.1MB

    • MD5

      eeefe3a2e976b1c5e04a5f0fd14e828b

    • SHA1

      b8419e6061490bb45eef0545abade250c71ffc32

    • SHA256

      fb7ecd1de3f4b84286e42fb834ee3af497af3dc674555351a1f755d3f1977cfd

    • SHA512

      0930124e4bb637cbb533785a5d1df7d6cb9720942023e84ba33fe49b8d2a04871e49a7c160950ddd37119ae8697742c8796b456c6f27c60e1702f0a3f7987959

    • SSDEEP

      98304:Cbt5S639OUs4KK/soh6crW1iWM7zDgbvtUhhtgg8p/4l7yz5jdBtu/Z82qX/dgr3:k33UUsK/WM73gbvmggJ72nA/S5d2QI

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks