General

  • Target

    4087ac4aa59c087a40a7f6be6b1d1f41.bin

  • Size

    3.8MB

  • Sample

    240805-brjqqawgmf

  • MD5

    2c73d16199b50a1e8e22da081f64c687

  • SHA1

    2475c325a8fb4ebe2fcdcbe90257630880ae8d73

  • SHA256

    85932f661baf5a25f626c4f84a910e974064cb39a675d72bee897f8d655eb3ba

  • SHA512

    aa6ed9cdc5be904d20756c1862493141ed48e047d4c4335fbd1719057817b95a623eb81dd87bcbb5e784e08d282afe36df2322efca1fccf5b539589124366586

  • SSDEEP

    98304:vftmI1+4+V1fxdYb8q2ttHANWv8GT9b3TNqavi8b/QBAUE:vfFM1XnhXAC3T93Nq4aAp

Malware Config

Targets

    • Target

      0384c6409bb5afac939fef6bb65bb6e5ca9d61eee4f20652e754cf0410cb7ebb.exe

    • Size

      3.8MB

    • MD5

      4087ac4aa59c087a40a7f6be6b1d1f41

    • SHA1

      ec07e43fbf9c80668f05f07c355381547f3662c7

    • SHA256

      0384c6409bb5afac939fef6bb65bb6e5ca9d61eee4f20652e754cf0410cb7ebb

    • SHA512

      b1ab2aeb5f38be4f45abf7f56096702e2f2b715c5f7602130f8dc64b3301684075a9d45b89d8b187005f7378626f60fc36c04c7f8e9d50880d625fd6d5308f4d

    • SSDEEP

      98304:NNF9XFgUtkpVLQ3gt3DPIYWYdRfIxbpjOsdIqbwjcOf12d3:hhFTqVM+3DUYdOxbEELbbOfQ9

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks