General

  • Target

    e465650097f93c1fb47c83a6710d2e4b80324e6b1dfbefbb6c352201fc902763

  • Size

    4.2MB

  • Sample

    241031-q4pvtsxpfy

  • MD5

    fed67ea0168896c32680382b1fb8ecd3

  • SHA1

    2d8462b69cb27a0256300d4ae9b7070823a24d87

  • SHA256

    e465650097f93c1fb47c83a6710d2e4b80324e6b1dfbefbb6c352201fc902763

  • SHA512

    b5f2e9426dd6cf7b960b852262f853283a324e0867f426b2f50e3f45482622c8acc4b461c092719248818979f037c11f84b659a692440f2d7be11c267bf42700

  • SSDEEP

    98304:IqZngwJWJc4XMz7DIRx1NkYrPPyvcKSovAB5fyRC/7Q5+GZmkWP:vgwwJcXz78RxD7PyvcjWA5fQC/6+B

Malware Config

Targets

    • Target

      e465650097f93c1fb47c83a6710d2e4b80324e6b1dfbefbb6c352201fc902763

    • Size

      4.2MB

    • MD5

      fed67ea0168896c32680382b1fb8ecd3

    • SHA1

      2d8462b69cb27a0256300d4ae9b7070823a24d87

    • SHA256

      e465650097f93c1fb47c83a6710d2e4b80324e6b1dfbefbb6c352201fc902763

    • SHA512

      b5f2e9426dd6cf7b960b852262f853283a324e0867f426b2f50e3f45482622c8acc4b461c092719248818979f037c11f84b659a692440f2d7be11c267bf42700

    • SSDEEP

      98304:IqZngwJWJc4XMz7DIRx1NkYrPPyvcKSovAB5fyRC/7Q5+GZmkWP:vgwwJcXz78RxD7PyvcjWA5fQC/6+B

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks