General

  • Target

    85557ffb7e7a718f92dd1535a390870998bf15955445464565225673d5c94d49

  • Size

    4.8MB

  • Sample

    241118-p84dcaxekl

  • MD5

    5bce66d5f4b8ceb2b10407cae4a3c917

  • SHA1

    0b62f1907114ba8936e935f383e0038c2d82e561

  • SHA256

    85557ffb7e7a718f92dd1535a390870998bf15955445464565225673d5c94d49

  • SHA512

    541c159d3413eb391d1709d45983bae97b2bbdc9da723426c84f6bcf0f97c54df7a97510185434890043ef4f1a8bf516c28a57549a02c46c109c2b746445db22

  • SSDEEP

    98304:NJrpItLC8W/khOXTmPEsOkWfU+stSd4ZW2rMVn2Awb1YVkQ7rYd5:7rpIU8W/k7ofb5dGWm6ob1ZVj

Malware Config

Targets

    • Target

      85557ffb7e7a718f92dd1535a390870998bf15955445464565225673d5c94d49

    • Size

      4.8MB

    • MD5

      5bce66d5f4b8ceb2b10407cae4a3c917

    • SHA1

      0b62f1907114ba8936e935f383e0038c2d82e561

    • SHA256

      85557ffb7e7a718f92dd1535a390870998bf15955445464565225673d5c94d49

    • SHA512

      541c159d3413eb391d1709d45983bae97b2bbdc9da723426c84f6bcf0f97c54df7a97510185434890043ef4f1a8bf516c28a57549a02c46c109c2b746445db22

    • SSDEEP

      98304:NJrpItLC8W/khOXTmPEsOkWfU+stSd4ZW2rMVn2Awb1YVkQ7rYd5:7rpIU8W/k7ofb5dGWm6ob1ZVj

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks