General

  • Target

    e528d79e2e022a617340e8e2b1a88b399b75dd7477bcac6c9cda931e1fd58739

  • Size

    5.0MB

  • Sample

    240714-f16n3axgrm

  • MD5

    93d3f7fab3863e140034776ead4ef7e4

  • SHA1

    e373b677ef7e3322d8c3ff513e1308ec528a6282

  • SHA256

    e528d79e2e022a617340e8e2b1a88b399b75dd7477bcac6c9cda931e1fd58739

  • SHA512

    663bfe84a2c8ff3e20ce8c6640ed0e4058c8f459a741d016257b2d99d9026ce8a3306d9a0979540d1e606ab0014d329dbcbce5be10976c892757c2e78f8c7638

  • SSDEEP

    98304:CFz47URAjBaCHSMwnyJ3EocMLXHf00eQl2ApovjcIduYteQ4nd23Qx+:6y5FaCHInyNEDMLXctQl2JjcQ9s3dyQ8

Malware Config

Targets

    • Target

      e528d79e2e022a617340e8e2b1a88b399b75dd7477bcac6c9cda931e1fd58739

    • Size

      5.0MB

    • MD5

      93d3f7fab3863e140034776ead4ef7e4

    • SHA1

      e373b677ef7e3322d8c3ff513e1308ec528a6282

    • SHA256

      e528d79e2e022a617340e8e2b1a88b399b75dd7477bcac6c9cda931e1fd58739

    • SHA512

      663bfe84a2c8ff3e20ce8c6640ed0e4058c8f459a741d016257b2d99d9026ce8a3306d9a0979540d1e606ab0014d329dbcbce5be10976c892757c2e78f8c7638

    • SSDEEP

      98304:CFz47URAjBaCHSMwnyJ3EocMLXHf00eQl2ApovjcIduYteQ4nd23Qx+:6y5FaCHInyNEDMLXctQl2JjcQ9s3dyQ8

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks