General

  • Target

    b9a4ff9d35a384626fbcb4b777301ff693affac1c5095cbdc848abac383ee39d

  • Size

    6.0MB

  • Sample

    241103-jz8zkszajc

  • MD5

    046f987ccf90ec662a99964236317152

  • SHA1

    1948f78099b1b7f8cfc0607d9a78178dc087f98d

  • SHA256

    b9a4ff9d35a384626fbcb4b777301ff693affac1c5095cbdc848abac383ee39d

  • SHA512

    ebd5b93670af696ba197657a14a116057c5b75f378667c03993c99665ac2b078fbeafcd78c29a040e699bfb4b1bb23139b40822712effcdf31c66cc60d58476f

  • SSDEEP

    98304:CofNNe5YzMEsh3J2ezKEHzUnGFJ20H9oOgYbpL0/1M+VwK8XhapfdTAQxd:35zpsz2QKEGGFtH9o9IKxV5GgfdTAQL

Malware Config

Targets

    • Target

      b9a4ff9d35a384626fbcb4b777301ff693affac1c5095cbdc848abac383ee39d

    • Size

      6.0MB

    • MD5

      046f987ccf90ec662a99964236317152

    • SHA1

      1948f78099b1b7f8cfc0607d9a78178dc087f98d

    • SHA256

      b9a4ff9d35a384626fbcb4b777301ff693affac1c5095cbdc848abac383ee39d

    • SHA512

      ebd5b93670af696ba197657a14a116057c5b75f378667c03993c99665ac2b078fbeafcd78c29a040e699bfb4b1bb23139b40822712effcdf31c66cc60d58476f

    • SSDEEP

      98304:CofNNe5YzMEsh3J2ezKEHzUnGFJ20H9oOgYbpL0/1M+VwK8XhapfdTAQxd:35zpsz2QKEGGFtH9o9IKxV5GgfdTAQL

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks