General

  • Target

    ed0a2b75c68af8b3aac53a23bc8567b60af2618eb31e259884ec7f3dbe979450

  • Size

    5.9MB

  • Sample

    240708-kljyza1dqn

  • MD5

    4a609691616b4a649a28eaeca6aeb70f

  • SHA1

    e142a1521c19673062eb3720fa57551ed13a7d23

  • SHA256

    ed0a2b75c68af8b3aac53a23bc8567b60af2618eb31e259884ec7f3dbe979450

  • SHA512

    9124ffa93816d5060f47b256daa365edf0e027f4ba170e5ba99eb1456e1133542fccba8b2c9a859c48ae14cd114b560017ee3ddfc60f743cbab38bff4b079d67

  • SSDEEP

    98304:OT1H1r9rI90H4gMDWOPHZ1W9XPNgpgBzuaVkDI/LLvMm:41Vr9rZvEWJVUAzua+k/nj

Malware Config

Targets

    • Target

      f85cfee6e5aaf84b1e0a5517c4f70dcc70a2fc98e39c5f06b9d33f2d309cfa16.exe

    • Size

      5.9MB

    • MD5

      92bfec483f66ffb7f39664711b0180a5

    • SHA1

      2df518a3a31c820e5358fc397e25e7cef8fa608c

    • SHA256

      f85cfee6e5aaf84b1e0a5517c4f70dcc70a2fc98e39c5f06b9d33f2d309cfa16

    • SHA512

      f0d583e3c1abddfd76b4ac2cdea99379f4ebc61942ab51d942aa2fa68feab55233dcade49bbb4a5e6c049414c9ff4507fbf35e9629743fc1d79f7ae72a6c9e71

    • SSDEEP

      98304:CWHIwoMKV8W9pvrIuyyJ9B7zEvE2V7XhYJSzL/XTleTFwpFBLuIuOzRD70QxZ:3otZ8W9dtxzEvZ9hY2L/XTCFw/rbYQb

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks