General

  • Target

    6313eae113582658405122ac9bb5b454a30211154c7e7d9229ae345e1b3afedc

  • Size

    3.4MB

  • Sample

    241125-m81w4stnat

  • MD5

    d036660c4d21223a6372162e20b3ee82

  • SHA1

    b65ea0c272431e2a0eff8fce27b8b05ccf694694

  • SHA256

    6313eae113582658405122ac9bb5b454a30211154c7e7d9229ae345e1b3afedc

  • SHA512

    891b3d43200f66e99f172dac66d55258ef04aac1cee51f15d107ca50a770bc4a59d4aa907da89dd3790f01981d782abfe79257e0c9d479d2506ff963581b1512

  • SSDEEP

    98304:NProXrh7aiEyGhLzluwZngWJmZdXUHceiGPt5IRL:aXACMLY0DJ4dkHfZPt5E

Malware Config

Targets

    • Target

      6313eae113582658405122ac9bb5b454a30211154c7e7d9229ae345e1b3afedc

    • Size

      3.4MB

    • MD5

      d036660c4d21223a6372162e20b3ee82

    • SHA1

      b65ea0c272431e2a0eff8fce27b8b05ccf694694

    • SHA256

      6313eae113582658405122ac9bb5b454a30211154c7e7d9229ae345e1b3afedc

    • SHA512

      891b3d43200f66e99f172dac66d55258ef04aac1cee51f15d107ca50a770bc4a59d4aa907da89dd3790f01981d782abfe79257e0c9d479d2506ff963581b1512

    • SSDEEP

      98304:NProXrh7aiEyGhLzluwZngWJmZdXUHceiGPt5IRL:aXACMLY0DJ4dkHfZPt5E

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks