General

  • Target

    deecc4ccd39de5b02eded282e5759890d9346ab1dc801f8cc7e9d317e06d27d3.exe

  • Size

    2.0MB

  • Sample

    240726-g5wv4a1erk

  • MD5

    75c18be95bcad2088ef213d17a9b3b3f

  • SHA1

    1652e9ea756b2d584be615716df47c6ffe8e95a4

  • SHA256

    deecc4ccd39de5b02eded282e5759890d9346ab1dc801f8cc7e9d317e06d27d3

  • SHA512

    775822fd207414d84cf1f9d07bf86353304602adb75463abbfa9e9d5fd55a34f1a886914b947c1d657c7f810984f43a32df2e652624231d790e950505e5fb59c

  • SSDEEP

    49152:32OL6WRiIlaLhyQJTpWm/l7xGgASdt49CDQidXL1:mOL1+LhvTpWm/b86dQilL

Malware Config

Extracted

Family

socks5systemz

C2

ejzlcke.ua

ddewfkn.info

Targets

    • Target

      deecc4ccd39de5b02eded282e5759890d9346ab1dc801f8cc7e9d317e06d27d3.exe

    • Size

      2.0MB

    • MD5

      75c18be95bcad2088ef213d17a9b3b3f

    • SHA1

      1652e9ea756b2d584be615716df47c6ffe8e95a4

    • SHA256

      deecc4ccd39de5b02eded282e5759890d9346ab1dc801f8cc7e9d317e06d27d3

    • SHA512

      775822fd207414d84cf1f9d07bf86353304602adb75463abbfa9e9d5fd55a34f1a886914b947c1d657c7f810984f43a32df2e652624231d790e950505e5fb59c

    • SSDEEP

      49152:32OL6WRiIlaLhyQJTpWm/l7xGgASdt49CDQidXL1:mOL1+LhvTpWm/b86dQilL

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks