General

  • Target

    5fed777576067863ffe782bbac26332fb53dbead8aeebdb8ac7f281a0117d117

  • Size

    5.7MB

  • Sample

    241113-nvx4qszrdx

  • MD5

    e5c205100777782f3c26969ae29be6a2

  • SHA1

    1d687eeccca466954155a140fec1bbe87c43bb43

  • SHA256

    5fed777576067863ffe782bbac26332fb53dbead8aeebdb8ac7f281a0117d117

  • SHA512

    ac1ec55ae82298fe9badafe84099c840e9949445be5d721e422c00bcd222dfc9498dae18dc39dd2daae4debe002a5636f7d05f02fae7243fb25b71c0882596d6

  • SSDEEP

    98304:PX4eSUu2G80z6rPQsKce0Jsovxf2O/juOaoOvcZK6Ed02zyazx11:vWw0Ycul//2dSI1yaR

Malware Config

Targets

    • Target

      5fed777576067863ffe782bbac26332fb53dbead8aeebdb8ac7f281a0117d117

    • Size

      5.7MB

    • MD5

      e5c205100777782f3c26969ae29be6a2

    • SHA1

      1d687eeccca466954155a140fec1bbe87c43bb43

    • SHA256

      5fed777576067863ffe782bbac26332fb53dbead8aeebdb8ac7f281a0117d117

    • SHA512

      ac1ec55ae82298fe9badafe84099c840e9949445be5d721e422c00bcd222dfc9498dae18dc39dd2daae4debe002a5636f7d05f02fae7243fb25b71c0882596d6

    • SSDEEP

      98304:PX4eSUu2G80z6rPQsKce0Jsovxf2O/juOaoOvcZK6Ed02zyazx11:vWw0Ycul//2dSI1yaR

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks