General

  • Target

    75e722495c157a05b557580863f90b856d6ec229c7cb4974a008c823377369f5.exe

  • Size

    4.1MB

  • Sample

    241102-gn8tbszcpg

  • MD5

    dc89c50e4c8399de48d3e16568d20c19

  • SHA1

    b20e3f6df7af6d1bccd7377c04567e1895fb968f

  • SHA256

    75e722495c157a05b557580863f90b856d6ec229c7cb4974a008c823377369f5

  • SHA512

    12e2ce5f6526948c8a43858f54f133dce6cd5bd7b80b170623f7386408ae8c7a7d293df41b14a46d4dc8efc871798f8111ec951275b2a3fb10eec54634968cfd

  • SSDEEP

    98304:ISLPnq/pTlAt97SLFFfm/SnP02BOCu0FyxoQFjoJ+cK:vPnqNlk2Bd/cCT0xoy8Jw

Malware Config

Targets

    • Target

      75e722495c157a05b557580863f90b856d6ec229c7cb4974a008c823377369f5.exe

    • Size

      4.1MB

    • MD5

      dc89c50e4c8399de48d3e16568d20c19

    • SHA1

      b20e3f6df7af6d1bccd7377c04567e1895fb968f

    • SHA256

      75e722495c157a05b557580863f90b856d6ec229c7cb4974a008c823377369f5

    • SHA512

      12e2ce5f6526948c8a43858f54f133dce6cd5bd7b80b170623f7386408ae8c7a7d293df41b14a46d4dc8efc871798f8111ec951275b2a3fb10eec54634968cfd

    • SSDEEP

      98304:ISLPnq/pTlAt97SLFFfm/SnP02BOCu0FyxoQFjoJ+cK:vPnqNlk2Bd/cCT0xoy8Jw

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks