General

  • Target

    736a73ef23e3bc92da0434164a612fcafb6a1d11c720622f92959849b3594c27

  • Size

    5.9MB

  • Sample

    241106-3pg8na1ajg

  • MD5

    c978992e0bfb6abe4734e80c0da7c02f

  • SHA1

    6d4f12291c920866920c25e7b08f73b50b79607d

  • SHA256

    736a73ef23e3bc92da0434164a612fcafb6a1d11c720622f92959849b3594c27

  • SHA512

    1b12b18eb00161501727e339c6c5f0c8a1f683d94dae1aaf42be8061d6adb1f4d780420e6c6eab6dbb63efee8118aa9d81d8a93e0303fc8ffb9dfa9bb862a57f

  • SSDEEP

    98304:4ekKk8htLEDv4JF5mehKZZ7SPRlOBhj6K9ooG37n9UB/scC+XLkwDjGeLUzX8dyM:YDatW4VFU/2PfOBlrooWM/scCCLUIdyM

Malware Config

Targets

    • Target

      736a73ef23e3bc92da0434164a612fcafb6a1d11c720622f92959849b3594c27

    • Size

      5.9MB

    • MD5

      c978992e0bfb6abe4734e80c0da7c02f

    • SHA1

      6d4f12291c920866920c25e7b08f73b50b79607d

    • SHA256

      736a73ef23e3bc92da0434164a612fcafb6a1d11c720622f92959849b3594c27

    • SHA512

      1b12b18eb00161501727e339c6c5f0c8a1f683d94dae1aaf42be8061d6adb1f4d780420e6c6eab6dbb63efee8118aa9d81d8a93e0303fc8ffb9dfa9bb862a57f

    • SSDEEP

      98304:4ekKk8htLEDv4JF5mehKZZ7SPRlOBhj6K9ooG37n9UB/scC+XLkwDjGeLUzX8dyM:YDatW4VFU/2PfOBlrooWM/scCCLUIdyM

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks