General

  • Target

    956a76e13f8a518ac69cd6f4121e2777aa112a5cd959a43864208fa86294bda5N

  • Size

    6.0MB

  • Sample

    241110-c9zekaxmcv

  • MD5

    945dcb41cb3b7cb96c1aaf3ebe424e10

  • SHA1

    1eb2fce239a8697e73268a776fbe8e12a4f28c36

  • SHA256

    956a76e13f8a518ac69cd6f4121e2777aa112a5cd959a43864208fa86294bda5

  • SHA512

    93e0d63a6f5d26485e3c701b26050eaa3d44d855841950423ca32951018b2921131a6b0bfdf4f97e01d1d6e4e795180898557419cd8cbb053c2242367b229f47

  • SSDEEP

    98304:4AMvwv72PdUOC1zplIY0KCO+Nta1MB1NScu4epCMozps4f6hlyssYucwXTwX1j+a:p17aiOC1zpjLCOiakvh1Mozps43WucGS

Malware Config

Targets

    • Target

      956a76e13f8a518ac69cd6f4121e2777aa112a5cd959a43864208fa86294bda5N

    • Size

      6.0MB

    • MD5

      945dcb41cb3b7cb96c1aaf3ebe424e10

    • SHA1

      1eb2fce239a8697e73268a776fbe8e12a4f28c36

    • SHA256

      956a76e13f8a518ac69cd6f4121e2777aa112a5cd959a43864208fa86294bda5

    • SHA512

      93e0d63a6f5d26485e3c701b26050eaa3d44d855841950423ca32951018b2921131a6b0bfdf4f97e01d1d6e4e795180898557419cd8cbb053c2242367b229f47

    • SSDEEP

      98304:4AMvwv72PdUOC1zplIY0KCO+Nta1MB1NScu4epCMozps4f6hlyssYucwXTwX1j+a:p17aiOC1zpjLCOiakvh1Mozps43WucGS

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks