General

  • Target

    85227b47c15407d24e6b8498c604f1cc74f26e6eb9461fc41532551842cd4fa1

  • Size

    5.4MB

  • Sample

    241102-2xdprsxmcs

  • MD5

    2ad5f8bc67541add3ccc07121ec13beb

  • SHA1

    56a71adb6608a5c56e50ca40f0341e9f1e107bdd

  • SHA256

    85227b47c15407d24e6b8498c604f1cc74f26e6eb9461fc41532551842cd4fa1

  • SHA512

    b6005474db80e4d4da9b75a02f8439c3023ee7c1e6611eda449441a05ac93226893b5d2ef734bf6ac0b4c0dca016a0943e16634c173638c0ddc98c6fe1d5f7d2

  • SSDEEP

    98304:Czy3Xpae/yZS09c+3Gkqmdt15oEuFKo9DUGfuO1vBlkGfnJOdlQZ5QxAN:ewaeIS0e+1vXEKcuCjkkJOfy5Qy

Malware Config

Targets

    • Target

      85227b47c15407d24e6b8498c604f1cc74f26e6eb9461fc41532551842cd4fa1

    • Size

      5.4MB

    • MD5

      2ad5f8bc67541add3ccc07121ec13beb

    • SHA1

      56a71adb6608a5c56e50ca40f0341e9f1e107bdd

    • SHA256

      85227b47c15407d24e6b8498c604f1cc74f26e6eb9461fc41532551842cd4fa1

    • SHA512

      b6005474db80e4d4da9b75a02f8439c3023ee7c1e6611eda449441a05ac93226893b5d2ef734bf6ac0b4c0dca016a0943e16634c173638c0ddc98c6fe1d5f7d2

    • SSDEEP

      98304:Czy3Xpae/yZS09c+3Gkqmdt15oEuFKo9DUGfuO1vBlkGfnJOdlQZ5QxAN:ewaeIS0e+1vXEKcuCjkkJOfy5Qy

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks