General

  • Target

    1c851a6c4b66fdfd101c01e876bd0a09cb99c2051e911d864c8c350829c435d8

  • Size

    6.0MB

  • Sample

    241118-lwl2ratmht

  • MD5

    e613e0a246a6dce8b7a535ae6185338e

  • SHA1

    19072cdd868bdfb1e5d2712bdb2ac2e690546a2a

  • SHA256

    1c851a6c4b66fdfd101c01e876bd0a09cb99c2051e911d864c8c350829c435d8

  • SHA512

    87908f7516aafa4b457a2e241108edde8e18510bde2909ecd3711032a01fa3cf3bc7bb5d5702a3680cb58f9a1072ada25a1f609e01320e1a0f22abdb0c6892b0

  • SSDEEP

    98304:NU7ie+Lspd95c3DtqR0v7ql06oaiRxnPmDa8iyDD8zLmnLFfr2dmp:heTd927qEThPm5RwzSLFfKS

Malware Config

Targets

    • Target

      1c851a6c4b66fdfd101c01e876bd0a09cb99c2051e911d864c8c350829c435d8

    • Size

      6.0MB

    • MD5

      e613e0a246a6dce8b7a535ae6185338e

    • SHA1

      19072cdd868bdfb1e5d2712bdb2ac2e690546a2a

    • SHA256

      1c851a6c4b66fdfd101c01e876bd0a09cb99c2051e911d864c8c350829c435d8

    • SHA512

      87908f7516aafa4b457a2e241108edde8e18510bde2909ecd3711032a01fa3cf3bc7bb5d5702a3680cb58f9a1072ada25a1f609e01320e1a0f22abdb0c6892b0

    • SSDEEP

      98304:NU7ie+Lspd95c3DtqR0v7ql06oaiRxnPmDa8iyDD8zLmnLFfr2dmp:heTd927qEThPm5RwzSLFfKS

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks