General

  • Target

    9bc2dbf337e73988642767cd9e485d18ec607b874972f88e28cf9bdfb33ad696

  • Size

    5.8MB

  • Sample

    241113-yb993axmgx

  • MD5

    97364005122ee41ee72a2d069530db4a

  • SHA1

    dbde7392ed274e09622a8d2b394ed3cd102b5c71

  • SHA256

    9bc2dbf337e73988642767cd9e485d18ec607b874972f88e28cf9bdfb33ad696

  • SHA512

    2354683dee53089f5cd0b28855ef8408df450ee5b89f0e19fac140074d974679b558780b5ee41966167ea756effa9d4715dbae0efe862850975566db101dc315

  • SSDEEP

    98304:PX454BVELpLBbA5U/LRfTd9ZJUQE2ZEc73VxbAeig2lL3my5uHsnOoIS9Myazx1C:veiVE5BdTRfh9ZJUQEIXrig25WyYMnnZ

Malware Config

Targets

    • Target

      9bc2dbf337e73988642767cd9e485d18ec607b874972f88e28cf9bdfb33ad696

    • Size

      5.8MB

    • MD5

      97364005122ee41ee72a2d069530db4a

    • SHA1

      dbde7392ed274e09622a8d2b394ed3cd102b5c71

    • SHA256

      9bc2dbf337e73988642767cd9e485d18ec607b874972f88e28cf9bdfb33ad696

    • SHA512

      2354683dee53089f5cd0b28855ef8408df450ee5b89f0e19fac140074d974679b558780b5ee41966167ea756effa9d4715dbae0efe862850975566db101dc315

    • SSDEEP

      98304:PX454BVELpLBbA5U/LRfTd9ZJUQE2ZEc73VxbAeig2lL3my5uHsnOoIS9Myazx1C:veiVE5BdTRfh9ZJUQEIXrig25WyYMnnZ

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks