General

  • Target

    2e9fa7872d95de3a1cfbd0ca0a91fdcf939dc100fb31a5cbb177529a3e706679

  • Size

    5.9MB

  • Sample

    241106-xzacxavpfw

  • MD5

    e0c32f9e1faccebfbad647e88364652d

  • SHA1

    016ae805b90d5c02ce66926af65e1bd097294c17

  • SHA256

    2e9fa7872d95de3a1cfbd0ca0a91fdcf939dc100fb31a5cbb177529a3e706679

  • SHA512

    34307d9f007957145988032aef8b4aac596e5a5be4ce4e4988d45ff6f51bec2886623b66bad3044814730e0a2ac5a23752d51f7be4880dfcf54b496616e10bbf

  • SSDEEP

    98304:4sUPriGehpKgbv+c0VxK/KCuYhqq7d9lrNTnZh1svrSJ9/wk3U8vWq3Tq7hkmFH:XUDiCQ+jx6puaqC9RNj3OvrSJ9It8vWl

Malware Config

Targets

    • Target

      2e9fa7872d95de3a1cfbd0ca0a91fdcf939dc100fb31a5cbb177529a3e706679

    • Size

      5.9MB

    • MD5

      e0c32f9e1faccebfbad647e88364652d

    • SHA1

      016ae805b90d5c02ce66926af65e1bd097294c17

    • SHA256

      2e9fa7872d95de3a1cfbd0ca0a91fdcf939dc100fb31a5cbb177529a3e706679

    • SHA512

      34307d9f007957145988032aef8b4aac596e5a5be4ce4e4988d45ff6f51bec2886623b66bad3044814730e0a2ac5a23752d51f7be4880dfcf54b496616e10bbf

    • SSDEEP

      98304:4sUPriGehpKgbv+c0VxK/KCuYhqq7d9lrNTnZh1svrSJ9/wk3U8vWq3Tq7hkmFH:XUDiCQ+jx6puaqC9RNj3OvrSJ9It8vWl

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks