General

  • Target

    deaa5b990471de5ecc802c42cc70dc9feb72756971916b412be5dfe0149f8aab

  • Size

    4.2MB

  • Sample

    241102-tscmxaskdr

  • MD5

    b596a690aad8ef260dbedd2a02b88669

  • SHA1

    9c10610deee40362615571ce81e724712ac5a6d3

  • SHA256

    deaa5b990471de5ecc802c42cc70dc9feb72756971916b412be5dfe0149f8aab

  • SHA512

    2bbd4f779dce2645be5760e702070ad80e3b12c452d04b1336ee12e5fa658a1e059abe2f389b71f4d24b426b4a32a62c3bc215237d4aab184fff4b2f37685dad

  • SSDEEP

    98304:IVx/PuqDD9GLtdYd5a0Xb8sWZhpZ9J3IA3nP7DVW7frWN:8J39GLtWnDXNEZP3bXa6N

Malware Config

Targets

    • Target

      deaa5b990471de5ecc802c42cc70dc9feb72756971916b412be5dfe0149f8aab

    • Size

      4.2MB

    • MD5

      b596a690aad8ef260dbedd2a02b88669

    • SHA1

      9c10610deee40362615571ce81e724712ac5a6d3

    • SHA256

      deaa5b990471de5ecc802c42cc70dc9feb72756971916b412be5dfe0149f8aab

    • SHA512

      2bbd4f779dce2645be5760e702070ad80e3b12c452d04b1336ee12e5fa658a1e059abe2f389b71f4d24b426b4a32a62c3bc215237d4aab184fff4b2f37685dad

    • SSDEEP

      98304:IVx/PuqDD9GLtdYd5a0Xb8sWZhpZ9J3IA3nP7DVW7frWN:8J39GLtWnDXNEZP3bXa6N

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks