General

  • Target

    1d68e00dcfec745e5019621578f23e2f.bin

  • Size

    3.8MB

  • Sample

    240802-bzerqsxgkl

  • MD5

    eabdff17468e23b8b09c7f7624ce4f0b

  • SHA1

    de9a33da56004258014449e890d1efb5292a4825

  • SHA256

    c7422402bcbac160ee4385488642c4d273e3d3880c13857042f67da373817914

  • SHA512

    86e436f64e77583c9ab793916cf77cf8508ddb3cea20c79e5af9400510e805b04fb1e8451ced96b6756e64c752d468655aca0eec7c46d0f9ada9f234b18f7cfe

  • SSDEEP

    98304:BnF6qr61W65/xiIKoTuLvSFnlkzLzRzou9Tm3rovNps:pF6qO1X5JiJoTWSfQL9jTmOa

Malware Config

Targets

    • Target

      35c1dd0c091271adcb8ebee5db2be736f14e48afdb05076191f6160cc020f614.exe

    • Size

      3.8MB

    • MD5

      1d68e00dcfec745e5019621578f23e2f

    • SHA1

      6d7851995ab78f14367b5d33c68034752f6f7d82

    • SHA256

      35c1dd0c091271adcb8ebee5db2be736f14e48afdb05076191f6160cc020f614

    • SHA512

      d0ee5421d3e98d43b3990a2cb78459e8a32fc933ba2980dac7e0c613c051d81cdd8e488eaac73d7fe5172aef2a94be14165009a9fd46e6b1164a390390745761

    • SSDEEP

      49152:1vAd0UwRcMLKrBgWiS3Lo1NmtuM5Ma4B0LygjEmchEkC5o/dIb3r3JUdusGFQV6c:NNogJSM10P+CJECOIP5yu1iAqwgadc1N

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks