General

  • Target

    4d2c6e6ee514e8952a526ae494235a59a55e062953745a004a054d1076443721

  • Size

    6.3MB

  • Sample

    241108-2ed8kstngn

  • MD5

    f112f8bc18c9831c3752a251df460a9e

  • SHA1

    11665bb3ba749878d664e37fee8c23a7048e41ee

  • SHA256

    4d2c6e6ee514e8952a526ae494235a59a55e062953745a004a054d1076443721

  • SHA512

    0c7bafe63ab31fd67b477e611a2c65e981ee467c630d8b2773d93e1102d7cd1cdfcbc39239d8ba2f545be252492379ad9f9998cf5c70c4f0347b3bddd7902402

  • SSDEEP

    196608:dfa4B1/ZwStLVSLEYKBZvYn1qxO0rc13f7n:R/ZDS4Y+vYyA

Malware Config

Targets

    • Target

      4d2c6e6ee514e8952a526ae494235a59a55e062953745a004a054d1076443721

    • Size

      6.3MB

    • MD5

      f112f8bc18c9831c3752a251df460a9e

    • SHA1

      11665bb3ba749878d664e37fee8c23a7048e41ee

    • SHA256

      4d2c6e6ee514e8952a526ae494235a59a55e062953745a004a054d1076443721

    • SHA512

      0c7bafe63ab31fd67b477e611a2c65e981ee467c630d8b2773d93e1102d7cd1cdfcbc39239d8ba2f545be252492379ad9f9998cf5c70c4f0347b3bddd7902402

    • SSDEEP

      196608:dfa4B1/ZwStLVSLEYKBZvYn1qxO0rc13f7n:R/ZDS4Y+vYyA

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks