General

  • Target

    7c31ade1f1f9df539451e33d1ec0cee163708a07592674ecaca5f4a37c02cace

  • Size

    4.7MB

  • Sample

    241112-th18hsyrdr

  • MD5

    85a22fae27ef9ca84832e1947f753cfa

  • SHA1

    88da04d98d05904d0dff735e789dd58e479bf526

  • SHA256

    7c31ade1f1f9df539451e33d1ec0cee163708a07592674ecaca5f4a37c02cace

  • SHA512

    07b61d7bdb779c9ca5cc292f5565b8b09daa4d4ffcf32babadc1245a7381aad166a4a70cdcc578d06250780f269fe0461722b544766edbb38fb557c6c2c271d0

  • SSDEEP

    98304:4m7Gd2jbNHTlvj9R6PzLxHUhDhd17GKj0qdmDgRehJZVU/:57gUbZGXx0f77GKRmr2

Malware Config

Targets

    • Target

      7c31ade1f1f9df539451e33d1ec0cee163708a07592674ecaca5f4a37c02cace

    • Size

      4.7MB

    • MD5

      85a22fae27ef9ca84832e1947f753cfa

    • SHA1

      88da04d98d05904d0dff735e789dd58e479bf526

    • SHA256

      7c31ade1f1f9df539451e33d1ec0cee163708a07592674ecaca5f4a37c02cace

    • SHA512

      07b61d7bdb779c9ca5cc292f5565b8b09daa4d4ffcf32babadc1245a7381aad166a4a70cdcc578d06250780f269fe0461722b544766edbb38fb557c6c2c271d0

    • SSDEEP

      98304:4m7Gd2jbNHTlvj9R6PzLxHUhDhd17GKj0qdmDgRehJZVU/:57gUbZGXx0f77GKRmr2

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks