General

  • Target

    7dbdb27b68d114532a9dbd9013202b3a70206e619ba9618d954c4c14822200c7

  • Size

    5.2MB

  • Sample

    240710-hwpk4atcpp

  • MD5

    be93baa9013c02fafdab665e9f49a12e

  • SHA1

    63ba9081015417d500a981da12ab2827c0553d5a

  • SHA256

    7dbdb27b68d114532a9dbd9013202b3a70206e619ba9618d954c4c14822200c7

  • SHA512

    2f142bee27656f73ce9a04cf6e703cd2c135044a06c11a12fc66414b74ca6396508401bff9fc4e8f3d820ef145c63f83c0221c90db9b3ca5dc2e29c03b524c08

  • SSDEEP

    98304:CY0jURv5c5eP+e29vB2LChIgiWjRYrlJ5jHkRhQXU6zSfPWV7WcLpGJJgQxsKh:ojUtvmn9vB2LChfiWjRYrv5jERiMWZB8

Malware Config

Targets

    • Target

      7dbdb27b68d114532a9dbd9013202b3a70206e619ba9618d954c4c14822200c7

    • Size

      5.2MB

    • MD5

      be93baa9013c02fafdab665e9f49a12e

    • SHA1

      63ba9081015417d500a981da12ab2827c0553d5a

    • SHA256

      7dbdb27b68d114532a9dbd9013202b3a70206e619ba9618d954c4c14822200c7

    • SHA512

      2f142bee27656f73ce9a04cf6e703cd2c135044a06c11a12fc66414b74ca6396508401bff9fc4e8f3d820ef145c63f83c0221c90db9b3ca5dc2e29c03b524c08

    • SSDEEP

      98304:CY0jURv5c5eP+e29vB2LChIgiWjRYrlJ5jHkRhQXU6zSfPWV7WcLpGJJgQxsKh:ojUtvmn9vB2LChfiWjRYrv5jERiMWZB8

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks