General

  • Target

    033edd4c5eebe907d0c071e846080d72eafd8d047a59be3c898ecd926f8f5763

  • Size

    2.7MB

  • Sample

    240919-c7wkwsxbkl

  • MD5

    9d638301c6a769cfc219502133716375

  • SHA1

    468ed0ec527abaa3700341c911fed6ea09494ebd

  • SHA256

    033edd4c5eebe907d0c071e846080d72eafd8d047a59be3c898ecd926f8f5763

  • SHA512

    be5f3d5e55369680a2c14ce7587c81e014b4af8b57d6c90fb70dcfb4e097da87c14801010f393f768978889c8f42a68bb882ac95e6bdb74a9777390fa8ff7dd9

  • SSDEEP

    49152:C9Qz4VE+Y7rbEpPxZ0Qc9rXMzAb/xSGTvgR3AXijUrGPbQPeGSsOYR1wFn4:MQEVRbZ09r8zm/xhgR3AXijrEPL9R1x

Malware Config

Targets

    • Target

      033edd4c5eebe907d0c071e846080d72eafd8d047a59be3c898ecd926f8f5763

    • Size

      2.7MB

    • MD5

      9d638301c6a769cfc219502133716375

    • SHA1

      468ed0ec527abaa3700341c911fed6ea09494ebd

    • SHA256

      033edd4c5eebe907d0c071e846080d72eafd8d047a59be3c898ecd926f8f5763

    • SHA512

      be5f3d5e55369680a2c14ce7587c81e014b4af8b57d6c90fb70dcfb4e097da87c14801010f393f768978889c8f42a68bb882ac95e6bdb74a9777390fa8ff7dd9

    • SSDEEP

      49152:C9Qz4VE+Y7rbEpPxZ0Qc9rXMzAb/xSGTvgR3AXijUrGPbQPeGSsOYR1wFn4:MQEVRbZ09r8zm/xhgR3AXijrEPL9R1x

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks