General

  • Target

    6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b

  • Size

    6.0MB

  • Sample

    241106-rvrthasdpr

  • MD5

    9385cbf1c87afce218fb2ab5137791a9

  • SHA1

    a18b9ad6628e4a14d0dc168d836b1184138592ec

  • SHA256

    6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b

  • SHA512

    5594ef83414c001bd1802a65dfd31fe58b0eabcbe6ed288395f6bd6d5b07e72a53687f23f3b53bebb22a00c283929b1c00e248a3cc749eaf531832382fd4ac72

  • SSDEEP

    98304:4JQ+iQOA7dcPFAvEEtsGMEgWuVZImQYpo8ZVT1pJn7UK5seeDaXX:+QvQOpCVcEobZphZVVoOn

Malware Config

Targets

    • Target

      6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b

    • Size

      6.0MB

    • MD5

      9385cbf1c87afce218fb2ab5137791a9

    • SHA1

      a18b9ad6628e4a14d0dc168d836b1184138592ec

    • SHA256

      6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b

    • SHA512

      5594ef83414c001bd1802a65dfd31fe58b0eabcbe6ed288395f6bd6d5b07e72a53687f23f3b53bebb22a00c283929b1c00e248a3cc749eaf531832382fd4ac72

    • SSDEEP

      98304:4JQ+iQOA7dcPFAvEEtsGMEgWuVZImQYpo8ZVT1pJn7UK5seeDaXX:+QvQOpCVcEobZphZVVoOn

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks