General

  • Target

    692cd60767837ece27f35a4f719c3985315f4f1de6e64f66736041ad4c574ba8

  • Size

    3.4MB

  • Sample

    241124-zce1zsykat

  • MD5

    4f56d60c04a7b3bbce509675b1006dc7

  • SHA1

    09e3890cadaf777f0785ce393caf153712643613

  • SHA256

    692cd60767837ece27f35a4f719c3985315f4f1de6e64f66736041ad4c574ba8

  • SHA512

    6f81a7fa90eb333fe248fe44dc965e88c3b4ee0da87554f5f3a274e1d069919f214405bcd47d5a2b4faa00d379c26e268bc3dbdfbcb6cbb1cef01f269a40f752

  • SSDEEP

    98304:N2ILqfne4s6G4ln9e4aSNACvmMupJhksZZffbYvrUZnxeSEo7:Y3e4s6G4lnkYrahhXffbYvoZxeSEo7

Malware Config

Targets

    • Target

      692cd60767837ece27f35a4f719c3985315f4f1de6e64f66736041ad4c574ba8

    • Size

      3.4MB

    • MD5

      4f56d60c04a7b3bbce509675b1006dc7

    • SHA1

      09e3890cadaf777f0785ce393caf153712643613

    • SHA256

      692cd60767837ece27f35a4f719c3985315f4f1de6e64f66736041ad4c574ba8

    • SHA512

      6f81a7fa90eb333fe248fe44dc965e88c3b4ee0da87554f5f3a274e1d069919f214405bcd47d5a2b4faa00d379c26e268bc3dbdfbcb6cbb1cef01f269a40f752

    • SSDEEP

      98304:N2ILqfne4s6G4ln9e4aSNACvmMupJhksZZffbYvrUZnxeSEo7:Y3e4s6G4lnkYrahhXffbYvoZxeSEo7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks