General

  • Target

    3f29edc45c2ae9845b9e91e03ed79cb5aa46159320911a80a1ae2d00cfca83d1

  • Size

    3.8MB

  • Sample

    241126-pr8aza1mhz

  • MD5

    0f51b942699f37fb270c79991a2bb926

  • SHA1

    4ee782937cf1ca5aed3bf5fb195a63f9f55f3fdb

  • SHA256

    3f29edc45c2ae9845b9e91e03ed79cb5aa46159320911a80a1ae2d00cfca83d1

  • SHA512

    4164fc0d59863244f4170545a90234430a1f95451951cf52c6a0905f770aa70e9f152ab0469509f35f49a6a0175b202d874a83a79f4313838149f711623a220f

  • SSDEEP

    49152:1vhu5jDH241XBf1pqEa6uiHX8vCWNoHMD0AfUdjuhjSyom0a5MAkc4gR4EAVVTV:NKXH1Ng7BisvCyosD0Af/hWyoM3v4cG7

Malware Config

Targets

    • Target

      3f29edc45c2ae9845b9e91e03ed79cb5aa46159320911a80a1ae2d00cfca83d1

    • Size

      3.8MB

    • MD5

      0f51b942699f37fb270c79991a2bb926

    • SHA1

      4ee782937cf1ca5aed3bf5fb195a63f9f55f3fdb

    • SHA256

      3f29edc45c2ae9845b9e91e03ed79cb5aa46159320911a80a1ae2d00cfca83d1

    • SHA512

      4164fc0d59863244f4170545a90234430a1f95451951cf52c6a0905f770aa70e9f152ab0469509f35f49a6a0175b202d874a83a79f4313838149f711623a220f

    • SSDEEP

      49152:1vhu5jDH241XBf1pqEa6uiHX8vCWNoHMD0AfUdjuhjSyom0a5MAkc4gR4EAVVTV:NKXH1Ng7BisvCyosD0Af/hWyoM3v4cG7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks