General

  • Target

    49ebc73257d234d51e8e654762d01896e06bac150ff94e362ce478df633ce89b

  • Size

    3.9MB

  • Sample

    240812-f4nbws1gnd

  • MD5

    bb6d6445316c5cceb7433d13deedde18

  • SHA1

    c56bee5b3cb4d69bf3a06f342d90bef1431c6544

  • SHA256

    49ebc73257d234d51e8e654762d01896e06bac150ff94e362ce478df633ce89b

  • SHA512

    c209272be2dd188cf40130ece50353efa2ca02aadff1e1697add691b8a066afcc4ab0c1202cb0aa58396f9d6863aa07f63a7b2782f9f312cf6a5bc5798e7e831

  • SSDEEP

    98304:Nl8bJrIgR4Cj3v3YR6SHDP3ETIQ7+hJEc9Ogk7mvV4dN:z8lrIgR4Cj3vIR6sP3EpQJEc9r4z

Malware Config

Targets

    • Target

      49ebc73257d234d51e8e654762d01896e06bac150ff94e362ce478df633ce89b

    • Size

      3.9MB

    • MD5

      bb6d6445316c5cceb7433d13deedde18

    • SHA1

      c56bee5b3cb4d69bf3a06f342d90bef1431c6544

    • SHA256

      49ebc73257d234d51e8e654762d01896e06bac150ff94e362ce478df633ce89b

    • SHA512

      c209272be2dd188cf40130ece50353efa2ca02aadff1e1697add691b8a066afcc4ab0c1202cb0aa58396f9d6863aa07f63a7b2782f9f312cf6a5bc5798e7e831

    • SSDEEP

      98304:Nl8bJrIgR4Cj3v3YR6SHDP3ETIQ7+hJEc9Ogk7mvV4dN:z8lrIgR4Cj3vIR6sP3EpQJEc9r4z

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks