General

  • Target

    6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43

  • Size

    5.0MB

  • Sample

    240711-kea3gs1ajg

  • MD5

    35b92d030e262bef50485db59c86b7c3

  • SHA1

    6f781c15ddc5881ae447fa95713ee1675d911695

  • SHA256

    6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43

  • SHA512

    99afcb79411d8796c8d57dad73b64a181436cba4a6493fbb6633a1fb1ca2d5b412b7fd1b615d7daf6484167985e191ca024e552eea4e8a352714d89c9f98f7a0

  • SSDEEP

    98304:CChJV3EdXD/IGm3j9yK3mUs6SjvNb1+7r80Hc/w+2dQxeE:Lh33EdXD/43j9yK37Z24r8rD2dQF

Malware Config

Targets

    • Target

      6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43

    • Size

      5.0MB

    • MD5

      35b92d030e262bef50485db59c86b7c3

    • SHA1

      6f781c15ddc5881ae447fa95713ee1675d911695

    • SHA256

      6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43

    • SHA512

      99afcb79411d8796c8d57dad73b64a181436cba4a6493fbb6633a1fb1ca2d5b412b7fd1b615d7daf6484167985e191ca024e552eea4e8a352714d89c9f98f7a0

    • SSDEEP

      98304:CChJV3EdXD/IGm3j9yK3mUs6SjvNb1+7r80Hc/w+2dQxeE:Lh33EdXD/43j9yK37Z24r8rD2dQF

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks