General

  • Target

    7fd0f3472c6afe3d3c7dfbb3dbd88552a5eb9b2b05ee26c86b57a234751cbf31

  • Size

    3.5MB

  • Sample

    241119-y4gs8a1hqc

  • MD5

    30f665662aa6659e3fbaf47722e95be6

  • SHA1

    c9f7baa89c728df9547e4ca476c1edf739a271b0

  • SHA256

    7fd0f3472c6afe3d3c7dfbb3dbd88552a5eb9b2b05ee26c86b57a234751cbf31

  • SHA512

    ab9946a25aea327ca709bee41736050a9c80f0650bc776539fe032c14a196526bccf9c7e75f1eaafe58c4fd70d565b3367df37f4a612ec8123b7aa31398d4fb0

  • SSDEEP

    98304:NmwDDh98ISyArMyZ8M/Lm3XCG9X5UsaKnu9d7:b5FAAcZTmnCc53CL7

Malware Config

Targets

    • Target

      7fd0f3472c6afe3d3c7dfbb3dbd88552a5eb9b2b05ee26c86b57a234751cbf31

    • Size

      3.5MB

    • MD5

      30f665662aa6659e3fbaf47722e95be6

    • SHA1

      c9f7baa89c728df9547e4ca476c1edf739a271b0

    • SHA256

      7fd0f3472c6afe3d3c7dfbb3dbd88552a5eb9b2b05ee26c86b57a234751cbf31

    • SHA512

      ab9946a25aea327ca709bee41736050a9c80f0650bc776539fe032c14a196526bccf9c7e75f1eaafe58c4fd70d565b3367df37f4a612ec8123b7aa31398d4fb0

    • SSDEEP

      98304:NmwDDh98ISyArMyZ8M/Lm3XCG9X5UsaKnu9d7:b5FAAcZTmnCc53CL7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks