General

  • Target

    d81a0d773324eb8288f666c07864688cbad7fd0b01239e4ee1e8aaed690801c1

  • Size

    5.3MB

  • Sample

    240711-jat45awapl

  • MD5

    121f3b93615c5f54183e72ae3e3e59a2

  • SHA1

    a4d79808cd62c43a5a15517e9279cdf579e32a54

  • SHA256

    d81a0d773324eb8288f666c07864688cbad7fd0b01239e4ee1e8aaed690801c1

  • SHA512

    d52e0badcf3a7a671c9cb3866b15556c304dcf23343c4ff0b6a44a1b1135899fa02e09ee522ec3330f71b0f201f070a78d57f15a01a89e96059ce7d6dac42622

  • SSDEEP

    98304:CNWdcO9N+9akStYq4DpQP3XYJAZanXO0YMKBMvYA0lhI+mBjP8YELFQxb:8W6O94ak249Q/Xu4aeCDClh7mBjP4LFE

Malware Config

Targets

    • Target

      d81a0d773324eb8288f666c07864688cbad7fd0b01239e4ee1e8aaed690801c1

    • Size

      5.3MB

    • MD5

      121f3b93615c5f54183e72ae3e3e59a2

    • SHA1

      a4d79808cd62c43a5a15517e9279cdf579e32a54

    • SHA256

      d81a0d773324eb8288f666c07864688cbad7fd0b01239e4ee1e8aaed690801c1

    • SHA512

      d52e0badcf3a7a671c9cb3866b15556c304dcf23343c4ff0b6a44a1b1135899fa02e09ee522ec3330f71b0f201f070a78d57f15a01a89e96059ce7d6dac42622

    • SSDEEP

      98304:CNWdcO9N+9akStYq4DpQP3XYJAZanXO0YMKBMvYA0lhI+mBjP8YELFQxb:8W6O94ak249Q/Xu4aeCDClh7mBjP4LFE

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks