General

  • Target

    20d0002172ac6e25892e38d986c92e31cd269762cd972e26f493dd852b829fee

  • Size

    4.1MB

  • Sample

    241030-laf9daypf1

  • MD5

    fc54b2526c2dfe1a32117f9165e7380a

  • SHA1

    2c5ef4857254c52a245eba8bb26f0098adf082c0

  • SHA256

    20d0002172ac6e25892e38d986c92e31cd269762cd972e26f493dd852b829fee

  • SHA512

    0a4b9563aee9497c3dc15b8122ba668e955043c23cb19108f012486bdcc015956e529aeb5ff3ccbb621909270cc87b93ecaece6ae15aabdd6ff578fcc70dbdd3

  • SSDEEP

    98304:IVA3IkOQnFmCoAFa3t+wL9Bp3aCQCiU98r:BIkOKFmCoIa9jp//9A

Malware Config

Targets

    • Target

      20d0002172ac6e25892e38d986c92e31cd269762cd972e26f493dd852b829fee

    • Size

      4.1MB

    • MD5

      fc54b2526c2dfe1a32117f9165e7380a

    • SHA1

      2c5ef4857254c52a245eba8bb26f0098adf082c0

    • SHA256

      20d0002172ac6e25892e38d986c92e31cd269762cd972e26f493dd852b829fee

    • SHA512

      0a4b9563aee9497c3dc15b8122ba668e955043c23cb19108f012486bdcc015956e529aeb5ff3ccbb621909270cc87b93ecaece6ae15aabdd6ff578fcc70dbdd3

    • SSDEEP

      98304:IVA3IkOQnFmCoAFa3t+wL9Bp3aCQCiU98r:BIkOKFmCoIa9jp//9A

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks