General

  • Target

    2ec886d8770da09928682590d15d7404.exe

  • Size

    3.8MB

  • Sample

    241009-2vhkyazhle

  • MD5

    2ec886d8770da09928682590d15d7404

  • SHA1

    56e22d3d0272c3cbc4abb8ed2e5c2507f70eac5c

  • SHA256

    17c98b33f87befc913c8d67314190cd05597717c49090b50d8c8a04f6ad22e2f

  • SHA512

    454570cab426425c0ef8804e8b27cb9aebac490c6c087aff116a690430b2e12e0f74b7ac9573fed6e0ad9d4a2ba7d07b802843728102735000a99095a585b103

  • SSDEEP

    98304:xdogpKn3xqbthT3457Gj822hIY/h77nnxan4PiJ9xx9bpmBeE:DogpS3EhUwwh/Bg8o9dbpmBeE

Malware Config

Targets

    • Target

      2ec886d8770da09928682590d15d7404.exe

    • Size

      3.8MB

    • MD5

      2ec886d8770da09928682590d15d7404

    • SHA1

      56e22d3d0272c3cbc4abb8ed2e5c2507f70eac5c

    • SHA256

      17c98b33f87befc913c8d67314190cd05597717c49090b50d8c8a04f6ad22e2f

    • SHA512

      454570cab426425c0ef8804e8b27cb9aebac490c6c087aff116a690430b2e12e0f74b7ac9573fed6e0ad9d4a2ba7d07b802843728102735000a99095a585b103

    • SSDEEP

      98304:xdogpKn3xqbthT3457Gj822hIY/h77nnxan4PiJ9xx9bpmBeE:DogpS3EhUwwh/Bg8o9dbpmBeE

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks