General

  • Target

    4a54ae992cdbec6cfe309567fb1bf1d6d2f73b5b73ff259f184f6e9230a352bf.exe

  • Size

    4.3MB

  • Sample

    240727-bqny2sxfjn

  • MD5

    db2338f35c9617d85df49c33df856dbb

  • SHA1

    08688195da256adaf01990a509e0ee7d4d730a4c

  • SHA256

    4a54ae992cdbec6cfe309567fb1bf1d6d2f73b5b73ff259f184f6e9230a352bf

  • SHA512

    053fd265de91b5b72b2897755fe62ea9fc17fcc044db0aae4f5eb5d65db4df42ceb4ff972280b3f38c53718a62253e46859d9b0550385e5e95af3e6cba4ae97e

  • SSDEEP

    98304:C2G863QWIt2exUGr31JhQUIkf8Hb3cURkiV0CfNXK+7:JG8eG2kUGr31vopV0cXK+7

Malware Config

Targets

    • Target

      4a54ae992cdbec6cfe309567fb1bf1d6d2f73b5b73ff259f184f6e9230a352bf.exe

    • Size

      4.3MB

    • MD5

      db2338f35c9617d85df49c33df856dbb

    • SHA1

      08688195da256adaf01990a509e0ee7d4d730a4c

    • SHA256

      4a54ae992cdbec6cfe309567fb1bf1d6d2f73b5b73ff259f184f6e9230a352bf

    • SHA512

      053fd265de91b5b72b2897755fe62ea9fc17fcc044db0aae4f5eb5d65db4df42ceb4ff972280b3f38c53718a62253e46859d9b0550385e5e95af3e6cba4ae97e

    • SSDEEP

      98304:C2G863QWIt2exUGr31JhQUIkf8Hb3cURkiV0CfNXK+7:JG8eG2kUGr31vopV0cXK+7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks