General

  • Target

    fb66dd43fa36134fadaa562f7dace1c23cbcf182d24d4bf3c7c6ec0a500ce268

  • Size

    4.1MB

  • Sample

    241125-pxk3matlfr

  • MD5

    f5fd1e58e75a69fa6ef51d173241ff2d

  • SHA1

    a6fb16646f13f49fe59c743aac46a780d5eb65c6

  • SHA256

    fb66dd43fa36134fadaa562f7dace1c23cbcf182d24d4bf3c7c6ec0a500ce268

  • SHA512

    cf15b27af390286490b52ccab3d136ac90de81ad44090d01bff88b4aa002f8a4a98181cfe2a30a2f9ac40d173edd2b6c5835d1ae52f7ee8d2903e4607c9bf6d7

  • SSDEEP

    98304:N0PS40OJDjqLscHusWCrOuzmgsBwQ42TeRGHMSago:270A6LBOsBdS4HfIo

Malware Config

Targets

    • Target

      fb66dd43fa36134fadaa562f7dace1c23cbcf182d24d4bf3c7c6ec0a500ce268

    • Size

      4.1MB

    • MD5

      f5fd1e58e75a69fa6ef51d173241ff2d

    • SHA1

      a6fb16646f13f49fe59c743aac46a780d5eb65c6

    • SHA256

      fb66dd43fa36134fadaa562f7dace1c23cbcf182d24d4bf3c7c6ec0a500ce268

    • SHA512

      cf15b27af390286490b52ccab3d136ac90de81ad44090d01bff88b4aa002f8a4a98181cfe2a30a2f9ac40d173edd2b6c5835d1ae52f7ee8d2903e4607c9bf6d7

    • SSDEEP

      98304:N0PS40OJDjqLscHusWCrOuzmgsBwQ42TeRGHMSago:270A6LBOsBdS4HfIo

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks