General

  • Target

    8f5985b7574b66aea72acda2413599036634d1dd0586ff4135f03c0fe7d9bdec.exe

  • Size

    2.0MB

  • Sample

    240726-e3ta3swflk

  • MD5

    26855f2047c547911e2c2532532f1eb6

  • SHA1

    a40be95522b948e35123ca4cd72b9d14c7f3cc40

  • SHA256

    8f5985b7574b66aea72acda2413599036634d1dd0586ff4135f03c0fe7d9bdec

  • SHA512

    85a773391a57310c655015109c289ec044df03676414f98dc65b1883fe3aea26937f81ed46124d58d0dc8f737c263ef007fedc9e51568f9d33864a3ad7a37e1b

  • SSDEEP

    49152:32115Bqx2wgevTb1FR0FdsEoZlDgrZcwiIx3WYdfSR:m11qxPRwGl0rZc4SR

Malware Config

Extracted

Family

socks5systemz

C2

ayktlcb.ru

bokkami.com

Targets

    • Target

      8f5985b7574b66aea72acda2413599036634d1dd0586ff4135f03c0fe7d9bdec.exe

    • Size

      2.0MB

    • MD5

      26855f2047c547911e2c2532532f1eb6

    • SHA1

      a40be95522b948e35123ca4cd72b9d14c7f3cc40

    • SHA256

      8f5985b7574b66aea72acda2413599036634d1dd0586ff4135f03c0fe7d9bdec

    • SHA512

      85a773391a57310c655015109c289ec044df03676414f98dc65b1883fe3aea26937f81ed46124d58d0dc8f737c263ef007fedc9e51568f9d33864a3ad7a37e1b

    • SSDEEP

      49152:32115Bqx2wgevTb1FR0FdsEoZlDgrZcwiIx3WYdfSR:m11qxPRwGl0rZc4SR

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks