General

  • Target

    8903dfc7a469319110892ee5f916640295c512103cce561f0ae672e3cc782123

  • Size

    5.3MB

  • Sample

    240712-l2bg7sydnn

  • MD5

    5681d1afee58e61efe4493b71a8f27ff

  • SHA1

    f4edfc0ec4eb7560d9c657fd16cc3c7824daf188

  • SHA256

    8903dfc7a469319110892ee5f916640295c512103cce561f0ae672e3cc782123

  • SHA512

    dc56e887eb3dd0d9070f75eb243abf603e7e93e644d8cd263d4fbd7ed3c775f51b9d94c1b380c629c69a26996a42293e1ef61ee2ea7019339641d576cdd4197f

  • SSDEEP

    98304:CdI1L3SiPYEdu/qUFR3THIk+HofBAdyDz8MYQxY:Uspguu/pvA238dQW

Malware Config

Targets

    • Target

      8903dfc7a469319110892ee5f916640295c512103cce561f0ae672e3cc782123

    • Size

      5.3MB

    • MD5

      5681d1afee58e61efe4493b71a8f27ff

    • SHA1

      f4edfc0ec4eb7560d9c657fd16cc3c7824daf188

    • SHA256

      8903dfc7a469319110892ee5f916640295c512103cce561f0ae672e3cc782123

    • SHA512

      dc56e887eb3dd0d9070f75eb243abf603e7e93e644d8cd263d4fbd7ed3c775f51b9d94c1b380c629c69a26996a42293e1ef61ee2ea7019339641d576cdd4197f

    • SSDEEP

      98304:CdI1L3SiPYEdu/qUFR3THIk+HofBAdyDz8MYQxY:Uspguu/pvA238dQW

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks