General

  • Target

    a0ca4749e4765b6f178d0962d4dc311274a08c493b5ade3a5c3066739edb95d5

  • Size

    4.7MB

  • Sample

    241118-r4gpwstmep

  • MD5

    3c56648a31026eef48743fceb11f96db

  • SHA1

    dc3cd539e787faf5ebe47950f23f1b730f883367

  • SHA256

    a0ca4749e4765b6f178d0962d4dc311274a08c493b5ade3a5c3066739edb95d5

  • SHA512

    752f360015586e658d12ae89c9c2b2b5ca3ee69cee3c1a86b8edbd699a2005eb3d7a054a696309ebb453b1d93534637c15069e2b4495a5d679fa74cda6b47ac3

  • SSDEEP

    98304:NrlmGtgQVYnsZHfxujkSkOI4hLmy2QGtuNMfa5w0FER4Bq27:zmIYnI/xugSpIqDGtuNQaSQER4Y27

Malware Config

Targets

    • Target

      a0ca4749e4765b6f178d0962d4dc311274a08c493b5ade3a5c3066739edb95d5

    • Size

      4.7MB

    • MD5

      3c56648a31026eef48743fceb11f96db

    • SHA1

      dc3cd539e787faf5ebe47950f23f1b730f883367

    • SHA256

      a0ca4749e4765b6f178d0962d4dc311274a08c493b5ade3a5c3066739edb95d5

    • SHA512

      752f360015586e658d12ae89c9c2b2b5ca3ee69cee3c1a86b8edbd699a2005eb3d7a054a696309ebb453b1d93534637c15069e2b4495a5d679fa74cda6b47ac3

    • SSDEEP

      98304:NrlmGtgQVYnsZHfxujkSkOI4hLmy2QGtuNMfa5w0FER4Bq27:zmIYnI/xugSpIqDGtuNQaSQER4Y27

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks