General

  • Target

    78804ad39307d66943356043e26bc6017135bb46add844386c2ab70ab619cb98

  • Size

    4.6MB

  • Sample

    241112-am97fayrcz

  • MD5

    c476ce9dfc68bdb73e84cd7213b2816d

  • SHA1

    fc861bcfb5fdc3a5dd7519dc28dd60cc2e37f70e

  • SHA256

    78804ad39307d66943356043e26bc6017135bb46add844386c2ab70ab619cb98

  • SHA512

    0993be360774f778b5a206452e9a3f9cf9f43acbf42a156f4dad6138e3bf4fb9f85b1215cd306f966d63ef423f9a3b6ffa31df99c150b54b964e5c49317fc888

  • SSDEEP

    98304:45HJ5Mj9K2CPNVQ88E2AskUdBlBq59V92OckOyCcpVj1pXn:yHJ5MhK5VqEZJUdB6x4k1Vjb

Malware Config

Targets

    • Target

      78804ad39307d66943356043e26bc6017135bb46add844386c2ab70ab619cb98

    • Size

      4.6MB

    • MD5

      c476ce9dfc68bdb73e84cd7213b2816d

    • SHA1

      fc861bcfb5fdc3a5dd7519dc28dd60cc2e37f70e

    • SHA256

      78804ad39307d66943356043e26bc6017135bb46add844386c2ab70ab619cb98

    • SHA512

      0993be360774f778b5a206452e9a3f9cf9f43acbf42a156f4dad6138e3bf4fb9f85b1215cd306f966d63ef423f9a3b6ffa31df99c150b54b964e5c49317fc888

    • SSDEEP

      98304:45HJ5Mj9K2CPNVQ88E2AskUdBlBq59V92OckOyCcpVj1pXn:yHJ5MhK5VqEZJUdB6x4k1Vjb

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks