General

  • Target

    e14e30c0fb3a7dde2bcf593b85341a0294d6980ec63ad4dc12a174f6743e804f

  • Size

    5.3MB

  • Sample

    241101-k1qp3axnat

  • MD5

    205a42a39ca5cc09e728b6587453779f

  • SHA1

    cb64fc8694267a82fff79382d467831d418b81f3

  • SHA256

    e14e30c0fb3a7dde2bcf593b85341a0294d6980ec63ad4dc12a174f6743e804f

  • SHA512

    381db1bc5edbf259dfc920e0fd5451958fc290bb86b0613e8bee03416492ad7e0ff0872bf540fdace0a4ee0170e9bae518abcaf52ea8736a3d6da63a4cd7172c

  • SSDEEP

    98304:Mp9QLuKRI7X8OtS0F3ltvGuQBqYGKoljGiZp/fkAq3/XBlqg0w2yAtoUmfVsqJ:GKLuK0Xo0JGuQRGtjZ/fkAq3/XBl3+o9

Malware Config

Targets

    • Target

      e14e30c0fb3a7dde2bcf593b85341a0294d6980ec63ad4dc12a174f6743e804f

    • Size

      5.3MB

    • MD5

      205a42a39ca5cc09e728b6587453779f

    • SHA1

      cb64fc8694267a82fff79382d467831d418b81f3

    • SHA256

      e14e30c0fb3a7dde2bcf593b85341a0294d6980ec63ad4dc12a174f6743e804f

    • SHA512

      381db1bc5edbf259dfc920e0fd5451958fc290bb86b0613e8bee03416492ad7e0ff0872bf540fdace0a4ee0170e9bae518abcaf52ea8736a3d6da63a4cd7172c

    • SSDEEP

      98304:Mp9QLuKRI7X8OtS0F3ltvGuQBqYGKoljGiZp/fkAq3/XBlqg0w2yAtoUmfVsqJ:GKLuK0Xo0JGuQRGtjZ/fkAq3/XBl3+o9

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks