General

  • Target

    50d91506da0aa3c7c07762df0f5d751e77b2b8d59e2d23642bfd39485e16d6fe

  • Size

    4.0MB

  • Sample

    241029-2v3k4szpgv

  • MD5

    f2a965cd2c574cf05ad119afbea06248

  • SHA1

    651fa87e6e7de510b2500a00e07d0ef5fb92e811

  • SHA256

    50d91506da0aa3c7c07762df0f5d751e77b2b8d59e2d23642bfd39485e16d6fe

  • SHA512

    eb56dc653c05e1d34379d3866cbde889108ad4f787a85a5b1dfc31c6ceddbab3318e56307c553cd5f359e31787720f17c8a8f0bccbc4c0583c002afa1eeadcf7

  • SSDEEP

    98304:I2Mc2zy0y/50IX7m9UJ52HQgAWR4mJMnIYsa6KwMnD2eICdlb9dC+D:eci0/z7KHQgAWR4UOIY16K/nD2zC/b5

Malware Config

Targets

    • Target

      50d91506da0aa3c7c07762df0f5d751e77b2b8d59e2d23642bfd39485e16d6fe

    • Size

      4.0MB

    • MD5

      f2a965cd2c574cf05ad119afbea06248

    • SHA1

      651fa87e6e7de510b2500a00e07d0ef5fb92e811

    • SHA256

      50d91506da0aa3c7c07762df0f5d751e77b2b8d59e2d23642bfd39485e16d6fe

    • SHA512

      eb56dc653c05e1d34379d3866cbde889108ad4f787a85a5b1dfc31c6ceddbab3318e56307c553cd5f359e31787720f17c8a8f0bccbc4c0583c002afa1eeadcf7

    • SSDEEP

      98304:I2Mc2zy0y/50IX7m9UJ52HQgAWR4mJMnIYsa6KwMnD2eICdlb9dC+D:eci0/z7KHQgAWR4UOIY16K/nD2zC/b5

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks