General

  • Target

    75348cefa63eabc6e8395cfe4dc9bcb25b04a15b706e94d32dc391cb6be1d4b6

  • Size

    3.9MB

  • Sample

    241118-t5kjaazhka

  • MD5

    5e6a31c380ec68a2488f554efb111eac

  • SHA1

    7e0c1e694d4621d9d183732c4d6132386e7090ad

  • SHA256

    75348cefa63eabc6e8395cfe4dc9bcb25b04a15b706e94d32dc391cb6be1d4b6

  • SHA512

    bf8950af595e89d9374adcb3b114357bae13d228ce22ff5b093d897b41fdf9477e3c2b3f0eb8bfe958c328c58ab606c7520ba93c66ce85e569bfe2d83706b891

  • SSDEEP

    98304:NHrAIqrX1fW3hCxuROpbWOzb85a+3pgCPEat4EM:t3qb1fW3gIRQf+nMaVM

Malware Config

Targets

    • Target

      75348cefa63eabc6e8395cfe4dc9bcb25b04a15b706e94d32dc391cb6be1d4b6

    • Size

      3.9MB

    • MD5

      5e6a31c380ec68a2488f554efb111eac

    • SHA1

      7e0c1e694d4621d9d183732c4d6132386e7090ad

    • SHA256

      75348cefa63eabc6e8395cfe4dc9bcb25b04a15b706e94d32dc391cb6be1d4b6

    • SHA512

      bf8950af595e89d9374adcb3b114357bae13d228ce22ff5b093d897b41fdf9477e3c2b3f0eb8bfe958c328c58ab606c7520ba93c66ce85e569bfe2d83706b891

    • SSDEEP

      98304:NHrAIqrX1fW3hCxuROpbWOzb85a+3pgCPEat4EM:t3qb1fW3gIRQf+nMaVM

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks