General

  • Target

    473ff73238c861770a7aa7fc4e00da5bbc2e137ada638fa544e2ff5349675798

  • Size

    4.7MB

  • Sample

    241112-dbn2lswmej

  • MD5

    acd2e53884cdd2d8c9ddf8cb2952036f

  • SHA1

    ff88370930d838fcb91573abc971f775dc077bee

  • SHA256

    473ff73238c861770a7aa7fc4e00da5bbc2e137ada638fa544e2ff5349675798

  • SHA512

    16a5d8923556848f1e09526c6e5ed3093014fb72cea353b30371642d5da48ba0edfece998d6c34b85c66bafff8ad27606c9dbce80424648732a4e51ad1f4a231

  • SSDEEP

    98304:45cAnPMjf9nreZ0d8VF77I7pmA1882BFWZ9Tzi7x+ZTIILrcIp8WF6:utnkjf9re+ugv2BcZJucIsK

Malware Config

Targets

    • Target

      473ff73238c861770a7aa7fc4e00da5bbc2e137ada638fa544e2ff5349675798

    • Size

      4.7MB

    • MD5

      acd2e53884cdd2d8c9ddf8cb2952036f

    • SHA1

      ff88370930d838fcb91573abc971f775dc077bee

    • SHA256

      473ff73238c861770a7aa7fc4e00da5bbc2e137ada638fa544e2ff5349675798

    • SHA512

      16a5d8923556848f1e09526c6e5ed3093014fb72cea353b30371642d5da48ba0edfece998d6c34b85c66bafff8ad27606c9dbce80424648732a4e51ad1f4a231

    • SSDEEP

      98304:45cAnPMjf9nreZ0d8VF77I7pmA1882BFWZ9Tzi7x+ZTIILrcIp8WF6:utnkjf9re+ugv2BcZJucIsK

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks