General

  • Target

    ed611c779d12296672586caad7f05cd9ca76c2d3eb651f6d9b6af212bd42015a

  • Size

    5.0MB

  • Sample

    241105-j4j61szpfk

  • MD5

    31aa0ef7b2ddd5ce943be97005b73855

  • SHA1

    5adac9878e42c14a7c90d5446bd003f644fc56eb

  • SHA256

    ed611c779d12296672586caad7f05cd9ca76c2d3eb651f6d9b6af212bd42015a

  • SHA512

    e5fc662e1e94e3824b868055c08fcafcd5b52405d680d9d555b6dfb21e72698eee1981b3e09dd74f921f9e8aacb0fa445b7a5e0245da987b6ac5f27e7c70461c

  • SSDEEP

    98304:eXqT6NmCMlTVw+Ak7EE3YbEJp6s7XPO9xXd32wlo1:QrMlZXp/z6s7XPsXdJo1

Malware Config

Targets

    • Target

      ed611c779d12296672586caad7f05cd9ca76c2d3eb651f6d9b6af212bd42015a

    • Size

      5.0MB

    • MD5

      31aa0ef7b2ddd5ce943be97005b73855

    • SHA1

      5adac9878e42c14a7c90d5446bd003f644fc56eb

    • SHA256

      ed611c779d12296672586caad7f05cd9ca76c2d3eb651f6d9b6af212bd42015a

    • SHA512

      e5fc662e1e94e3824b868055c08fcafcd5b52405d680d9d555b6dfb21e72698eee1981b3e09dd74f921f9e8aacb0fa445b7a5e0245da987b6ac5f27e7c70461c

    • SSDEEP

      98304:eXqT6NmCMlTVw+Ak7EE3YbEJp6s7XPO9xXd32wlo1:QrMlZXp/z6s7XPsXdJo1

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks