General

  • Target

    6149442dd86bfc531381f60b8e418b8cae8bc2e6e8b8d4ba8654689a73d50b73

  • Size

    5.4MB

  • Sample

    241104-hjqbvswjds

  • MD5

    fa3e57568a80f0fc9645580e116073b7

  • SHA1

    50316634f825ccf113025f90f5d42932fa15771b

  • SHA256

    6149442dd86bfc531381f60b8e418b8cae8bc2e6e8b8d4ba8654689a73d50b73

  • SHA512

    ddba647307dd7d8511455c9384ab5e59bef5d5c94985bcdd71522f2b3ec84a111f304c4ca213dc7b6d23d1b68400fb15cf47d17fd016521b60d7a08377353b77

  • SSDEEP

    98304:Q4N6dmm6N9lXWr6NfJJ2yqNjIl3CLJuPbJtUiR6eaVuPmWj524KiqB5:rm+Wr6lJJjqa3cElqiYwPmIhKiM5

Malware Config

Targets

    • Target

      6149442dd86bfc531381f60b8e418b8cae8bc2e6e8b8d4ba8654689a73d50b73

    • Size

      5.4MB

    • MD5

      fa3e57568a80f0fc9645580e116073b7

    • SHA1

      50316634f825ccf113025f90f5d42932fa15771b

    • SHA256

      6149442dd86bfc531381f60b8e418b8cae8bc2e6e8b8d4ba8654689a73d50b73

    • SHA512

      ddba647307dd7d8511455c9384ab5e59bef5d5c94985bcdd71522f2b3ec84a111f304c4ca213dc7b6d23d1b68400fb15cf47d17fd016521b60d7a08377353b77

    • SSDEEP

      98304:Q4N6dmm6N9lXWr6NfJJ2yqNjIl3CLJuPbJtUiR6eaVuPmWj524KiqB5:rm+Wr6lJJjqa3cElqiYwPmIhKiM5

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks