General

  • Target

    544552e73ba60fdbd8e02d24c72b0e15802e7e6f012287c105b1ebab1a559658

  • Size

    6.1MB

  • Sample

    241104-1ect3sxfnb

  • MD5

    f07f9862815f9e48f62589a54312722a

  • SHA1

    65ab12051665cbe3f7a982ca45f82c926b74e5aa

  • SHA256

    544552e73ba60fdbd8e02d24c72b0e15802e7e6f012287c105b1ebab1a559658

  • SHA512

    f52dfa0e958185372d604b3f81c3f47cd00c2312ce494335d084abc95da5d22f1c066d2f3351adc6857990ecff3271a5cbe64e64299eed6f668fb9780a8d8d63

  • SSDEEP

    196608:xj4yICVCgw7oci6ZFXJKlH2zpPdySftm8vvDrGFgBd6d:xjIcCg0oD63JKJEPVthDwg2

Malware Config

Targets

    • Target

      544552e73ba60fdbd8e02d24c72b0e15802e7e6f012287c105b1ebab1a559658

    • Size

      6.1MB

    • MD5

      f07f9862815f9e48f62589a54312722a

    • SHA1

      65ab12051665cbe3f7a982ca45f82c926b74e5aa

    • SHA256

      544552e73ba60fdbd8e02d24c72b0e15802e7e6f012287c105b1ebab1a559658

    • SHA512

      f52dfa0e958185372d604b3f81c3f47cd00c2312ce494335d084abc95da5d22f1c066d2f3351adc6857990ecff3271a5cbe64e64299eed6f668fb9780a8d8d63

    • SSDEEP

      196608:xj4yICVCgw7oci6ZFXJKlH2zpPdySftm8vvDrGFgBd6d:xjIcCg0oD63JKJEPVthDwg2

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks