General

  • Target

    a668c10fcc80d0d00a68e5f1ce29df536b4272111bf8f4a319b3011be748c09f

  • Size

    5.4MB

  • Sample

    240709-3z8tcsvhrg

  • MD5

    a41aa021dce703bdd234ebee529d695a

  • SHA1

    1e14f4c94b6836f1337e65cee6201c892a431e6a

  • SHA256

    a668c10fcc80d0d00a68e5f1ce29df536b4272111bf8f4a319b3011be748c09f

  • SHA512

    848d505df945f0efcc26875093f97cbc903dd0bbbdfab250c337117600596ea8a1fa698fa17861b6650088f156efbbb3968445205e3cdef86b9bdeedb67befa3

  • SSDEEP

    98304:CqdsYt3c0/kNPAxFDHaVAJzVfc6oPN1M0/f6xFR/bjqzRMidFmWJM3/Ug8poEZkl:HZ3v/u4HzaVCRkhqvR/bjG1E13cJViQ2

Malware Config

Targets

    • Target

      a668c10fcc80d0d00a68e5f1ce29df536b4272111bf8f4a319b3011be748c09f

    • Size

      5.4MB

    • MD5

      a41aa021dce703bdd234ebee529d695a

    • SHA1

      1e14f4c94b6836f1337e65cee6201c892a431e6a

    • SHA256

      a668c10fcc80d0d00a68e5f1ce29df536b4272111bf8f4a319b3011be748c09f

    • SHA512

      848d505df945f0efcc26875093f97cbc903dd0bbbdfab250c337117600596ea8a1fa698fa17861b6650088f156efbbb3968445205e3cdef86b9bdeedb67befa3

    • SSDEEP

      98304:CqdsYt3c0/kNPAxFDHaVAJzVfc6oPN1M0/f6xFR/bjqzRMidFmWJM3/Ug8poEZkl:HZ3v/u4HzaVCRkhqvR/bjG1E13cJViQ2

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks