General

  • Target

    7b3d9991749c5ec551e032d64076696e40257a83e58d735f8040f34322fc9f9f

  • Size

    5.9MB

  • Sample

    241107-k32v4szcqp

  • MD5

    94b3962fa6553aa91008c6b3f96e4af2

  • SHA1

    208d8ba1018dedded47d50a75a60bea564576de0

  • SHA256

    7b3d9991749c5ec551e032d64076696e40257a83e58d735f8040f34322fc9f9f

  • SHA512

    05f48aaddf4b7a290b38f2422b61d63b8efd0c275250c8979d9ed316daa7cf038724ecd2827856279dba4122c620ef42d174778863669f4450adc9f6461b4146

  • SSDEEP

    98304:4tkS5vGsEnt89U7qQxkygaPE3c/aZuU+DVHqwOrQi3zkMmmn+OYb47Jxn7:XCvG7aaqQqyEs/5qnZ+kJx7

Malware Config

Targets

    • Target

      7b3d9991749c5ec551e032d64076696e40257a83e58d735f8040f34322fc9f9f

    • Size

      5.9MB

    • MD5

      94b3962fa6553aa91008c6b3f96e4af2

    • SHA1

      208d8ba1018dedded47d50a75a60bea564576de0

    • SHA256

      7b3d9991749c5ec551e032d64076696e40257a83e58d735f8040f34322fc9f9f

    • SHA512

      05f48aaddf4b7a290b38f2422b61d63b8efd0c275250c8979d9ed316daa7cf038724ecd2827856279dba4122c620ef42d174778863669f4450adc9f6461b4146

    • SSDEEP

      98304:4tkS5vGsEnt89U7qQxkygaPE3c/aZuU+DVHqwOrQi3zkMmmn+OYb47Jxn7:XCvG7aaqQqyEs/5qnZ+kJx7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks