General

  • Target

    9385cbf1c87afce218fb2ab5137791a9.bin

  • Size

    6.0MB

  • Sample

    241107-b23lksvlal

  • MD5

    2c3ef375510ebee2a0c7e7d6c4ffe01e

  • SHA1

    73aea0ac00767f3a878ba0bdad9b7fa340a208fa

  • SHA256

    22fb2d2bd7336a1e5aec585c8013f668a64387befc079da0039a25f0fcae0eb5

  • SHA512

    6a5d1e9365d66e0e8250d469033f139b62a2d846be44e8fbc0bb05ef67b39a9be5e96d2effd167aaea946e4de968448afbf3670784705a184d16ca4fffa8c537

  • SSDEEP

    98304:AmU5/tFlY70mafSJU0Xndm+4BptEMCDWh0KGIBQBMGNS/779rzCo3CaZmQ6Rgc:AmU51Y70nOnYXErDQ3nONS77B+Cholyc

Malware Config

Targets

    • Target

      6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b.exe

    • Size

      6.0MB

    • MD5

      9385cbf1c87afce218fb2ab5137791a9

    • SHA1

      a18b9ad6628e4a14d0dc168d836b1184138592ec

    • SHA256

      6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b

    • SHA512

      5594ef83414c001bd1802a65dfd31fe58b0eabcbe6ed288395f6bd6d5b07e72a53687f23f3b53bebb22a00c283929b1c00e248a3cc749eaf531832382fd4ac72

    • SSDEEP

      98304:4JQ+iQOA7dcPFAvEEtsGMEgWuVZImQYpo8ZVT1pJn7UK5seeDaXX:+QvQOpCVcEobZphZVVoOn

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks