General

  • Target

    fd63528e5889cff0958711acf01d114a81096a06606b5ae0f92017faf5eb2a6a

  • Size

    6.1MB

  • Sample

    241104-zkw98szkdk

  • MD5

    97c2943a670a2f157e95db670dfe151f

  • SHA1

    bbe83ca54bec740939e3a0a2d6b58232d893f8bc

  • SHA256

    fd63528e5889cff0958711acf01d114a81096a06606b5ae0f92017faf5eb2a6a

  • SHA512

    9371b6e3fcec8d77544806ad137cb036c5f78662eb6be538bdc89f9cac81317eca9010d22b72e788f3eaba75d512a755529be7b353363e05582b0e311e4a2cc3

  • SSDEEP

    196608:Pz/p5p7wJXJJSppe4NPzcCCUZ0UzeP2nC:L/BXeggCjPeOC

Malware Config

Targets

    • Target

      fd63528e5889cff0958711acf01d114a81096a06606b5ae0f92017faf5eb2a6a

    • Size

      6.1MB

    • MD5

      97c2943a670a2f157e95db670dfe151f

    • SHA1

      bbe83ca54bec740939e3a0a2d6b58232d893f8bc

    • SHA256

      fd63528e5889cff0958711acf01d114a81096a06606b5ae0f92017faf5eb2a6a

    • SHA512

      9371b6e3fcec8d77544806ad137cb036c5f78662eb6be538bdc89f9cac81317eca9010d22b72e788f3eaba75d512a755529be7b353363e05582b0e311e4a2cc3

    • SSDEEP

      196608:Pz/p5p7wJXJJSppe4NPzcCCUZ0UzeP2nC:L/BXeggCjPeOC

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks