General

  • Target

    dcf45a3386d6e8a1efa6b2040125c3ca.exe

  • Size

    5.3MB

  • Sample

    241101-zprwbawrbn

  • MD5

    dcf45a3386d6e8a1efa6b2040125c3ca

  • SHA1

    6a7e356507bd3777b6cd9677627e31ce6be7d9cf

  • SHA256

    e709b26315714057ce041823f8a63f38064790a4a2af8fa00a9b63ea19d82329

  • SHA512

    c32ecdc9ec8aaab6c1fd12eff22e83b74f9300e66d9cdfce1f1cf182a944e54a9f4e1a3ee6508aadc7927691760faa89591da6ba8b4298e5eb5cd513bdad6ae8

  • SSDEEP

    98304:MW5j/7pHsZpdItCe3f2Ic0srZCngwwoyR3BDr2ZWpz8UuAxKPtsqJ:/5j/lMZpdyCk1sVwkTR3MMz8UuAsFsU

Malware Config

Targets

    • Target

      dcf45a3386d6e8a1efa6b2040125c3ca.exe

    • Size

      5.3MB

    • MD5

      dcf45a3386d6e8a1efa6b2040125c3ca

    • SHA1

      6a7e356507bd3777b6cd9677627e31ce6be7d9cf

    • SHA256

      e709b26315714057ce041823f8a63f38064790a4a2af8fa00a9b63ea19d82329

    • SHA512

      c32ecdc9ec8aaab6c1fd12eff22e83b74f9300e66d9cdfce1f1cf182a944e54a9f4e1a3ee6508aadc7927691760faa89591da6ba8b4298e5eb5cd513bdad6ae8

    • SSDEEP

      98304:MW5j/7pHsZpdItCe3f2Ic0srZCngwwoyR3BDr2ZWpz8UuAxKPtsqJ:/5j/lMZpdyCk1sVwkTR3MMz8UuAsFsU

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks