General

  • Target

    ae6ba87556eb0bdedefc4752d7e613f88f4083eb9ca40f7ec7e9549aec278d23

  • Size

    3.6MB

  • Sample

    241118-xntmeaspdv

  • MD5

    915ca4a4d4841052c644c1c0cfceca09

  • SHA1

    4e644b01367d968169194479c9fb0815a5fbd356

  • SHA256

    ae6ba87556eb0bdedefc4752d7e613f88f4083eb9ca40f7ec7e9549aec278d23

  • SHA512

    d6662b58f89d8fdf856973f1797259a8453f04da4cbae4138ebba4cce139cc79339e7543410656f726eb4d9d49c45ee23470daf4405626f788a2c628c7c82734

  • SSDEEP

    98304:NGpUv6S5PidhBXRazqqwF6wpEsbb0p3ZasLz8bEI3mA7/09:cpU50RXUzVsjGybMHsgI3ba

Malware Config

Targets

    • Target

      ae6ba87556eb0bdedefc4752d7e613f88f4083eb9ca40f7ec7e9549aec278d23

    • Size

      3.6MB

    • MD5

      915ca4a4d4841052c644c1c0cfceca09

    • SHA1

      4e644b01367d968169194479c9fb0815a5fbd356

    • SHA256

      ae6ba87556eb0bdedefc4752d7e613f88f4083eb9ca40f7ec7e9549aec278d23

    • SHA512

      d6662b58f89d8fdf856973f1797259a8453f04da4cbae4138ebba4cce139cc79339e7543410656f726eb4d9d49c45ee23470daf4405626f788a2c628c7c82734

    • SSDEEP

      98304:NGpUv6S5PidhBXRazqqwF6wpEsbb0p3ZasLz8bEI3mA7/09:cpU50RXUzVsjGybMHsgI3ba

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks