General

  • Target

    211278381d16c98fc153150fcfe9a457592792ade0b94747b2656b42dc8dea96

  • Size

    5.9MB

  • Sample

    241114-kg7jgawejg

  • MD5

    63f093e8c11ec3400762c6626448d9b6

  • SHA1

    7bf748e8a27aa1fc06fdb89e8a5442e6c8136755

  • SHA256

    211278381d16c98fc153150fcfe9a457592792ade0b94747b2656b42dc8dea96

  • SHA512

    293be33543e5684ae62cb2c2424fe6322dffc9922cc1df1970ffc663fa0321d48a9c793355df7dae8b19e34019d6659b88be11a1fa71d0b2402e4888ec78194d

  • SSDEEP

    98304:PX45ZuT2RR7lMNe/bkghvp5xz/kY8A3ZOdWTTkSRbXeoIxxpyazx1L:v9T2RRJCS7xz/Z8AJrRDeoIxxpyaX

Malware Config

Targets

    • Target

      211278381d16c98fc153150fcfe9a457592792ade0b94747b2656b42dc8dea96

    • Size

      5.9MB

    • MD5

      63f093e8c11ec3400762c6626448d9b6

    • SHA1

      7bf748e8a27aa1fc06fdb89e8a5442e6c8136755

    • SHA256

      211278381d16c98fc153150fcfe9a457592792ade0b94747b2656b42dc8dea96

    • SHA512

      293be33543e5684ae62cb2c2424fe6322dffc9922cc1df1970ffc663fa0321d48a9c793355df7dae8b19e34019d6659b88be11a1fa71d0b2402e4888ec78194d

    • SSDEEP

      98304:PX45ZuT2RR7lMNe/bkghvp5xz/kY8A3ZOdWTTkSRbXeoIxxpyazx1L:v9T2RRJCS7xz/Z8AJrRDeoIxxpyaX

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks