General

  • Target

    d3e019c718c60120b0e699ef31b4696574109a9a3f6b981fcf049b58e0e1af8d

  • Size

    4.2MB

  • Sample

    241030-phe8tstcpn

  • MD5

    b8105f6b202aedafe587b0c3c84ee016

  • SHA1

    7480c794f85437c631fbda08b275a39d8e0e0a8a

  • SHA256

    d3e019c718c60120b0e699ef31b4696574109a9a3f6b981fcf049b58e0e1af8d

  • SHA512

    e2bbcd3a8905ccfe4baae6a19417919718109e3f3a404ebcef1f19e95966d324d361da15ed6f57d3e05f8f288aae8ee905e1a5858dd7e2716e72043aef990f85

  • SSDEEP

    98304:IegyX4fas63EDWfQd2z7jjvGi/UzWH/ubqVu9L:3lobfDIjz7mic4/uSo

Malware Config

Targets

    • Target

      d3e019c718c60120b0e699ef31b4696574109a9a3f6b981fcf049b58e0e1af8d

    • Size

      4.2MB

    • MD5

      b8105f6b202aedafe587b0c3c84ee016

    • SHA1

      7480c794f85437c631fbda08b275a39d8e0e0a8a

    • SHA256

      d3e019c718c60120b0e699ef31b4696574109a9a3f6b981fcf049b58e0e1af8d

    • SHA512

      e2bbcd3a8905ccfe4baae6a19417919718109e3f3a404ebcef1f19e95966d324d361da15ed6f57d3e05f8f288aae8ee905e1a5858dd7e2716e72043aef990f85

    • SSDEEP

      98304:IegyX4fas63EDWfQd2z7jjvGi/UzWH/ubqVu9L:3lobfDIjz7mic4/uSo

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks