General

  • Target

    22c698801fc9c29499ede19494abf2b257d0420fceebcab78e8ba608c404085f

  • Size

    4.4MB

  • Sample

    240810-xcrzfawgkh

  • MD5

    dd8534dee86b97ebd41bf87d35ec5fb6

  • SHA1

    1292227448e15341c38e6331c8b40312a86aa33a

  • SHA256

    22c698801fc9c29499ede19494abf2b257d0420fceebcab78e8ba608c404085f

  • SHA512

    9419dd66b32dfbc88d0365820e792b0b62af0cce9530c670fc5c6938ef2744889289dde3d9f4eb0acbbfd62eff48ce59fdbbef1ef82046934d3e7824cd2195a1

  • SSDEEP

    98304:NQci3KE5KHx7XsaBMtPQqcx/oOpqS6KzYWYiTewMl/nLYXzpoX8gpmdZ:Di3DKhPmu1Zp6nLYDCX8nP

Malware Config

Targets

    • Target

      22c698801fc9c29499ede19494abf2b257d0420fceebcab78e8ba608c404085f

    • Size

      4.4MB

    • MD5

      dd8534dee86b97ebd41bf87d35ec5fb6

    • SHA1

      1292227448e15341c38e6331c8b40312a86aa33a

    • SHA256

      22c698801fc9c29499ede19494abf2b257d0420fceebcab78e8ba608c404085f

    • SHA512

      9419dd66b32dfbc88d0365820e792b0b62af0cce9530c670fc5c6938ef2744889289dde3d9f4eb0acbbfd62eff48ce59fdbbef1ef82046934d3e7824cd2195a1

    • SSDEEP

      98304:NQci3KE5KHx7XsaBMtPQqcx/oOpqS6KzYWYiTewMl/nLYXzpoX8gpmdZ:Di3DKhPmu1Zp6nLYDCX8nP

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks