General

  • Target

    0bdaadfc0c9d1f1b5c8d9fc53cb3dd80a5c29c7dadd013d32ab8eb2d4c933bd7

  • Size

    3.8MB

  • Sample

    241127-cnfeka1pd1

  • MD5

    1cb7e15d088a241e72c2fe4dd175eca7

  • SHA1

    faa14def6db42a7e4ffa912f2460faa5a02023d4

  • SHA256

    0bdaadfc0c9d1f1b5c8d9fc53cb3dd80a5c29c7dadd013d32ab8eb2d4c933bd7

  • SHA512

    2e2df9809665168ec01aa9e332b87bcc430ffb9f08bf99b35af07dc03d13b35ccda3b089b5297d46bc60f41943fe4173205d871d5912422e34d4f4f05fc3e33b

  • SSDEEP

    98304:N0tLu9Q3naazMaBk1OwP5a79kYtVYcOCs/yTspnC9Yf:qLgQXaKMWk1OG5URvVRyHpnC9Yf

Malware Config

Targets

    • Target

      0bdaadfc0c9d1f1b5c8d9fc53cb3dd80a5c29c7dadd013d32ab8eb2d4c933bd7

    • Size

      3.8MB

    • MD5

      1cb7e15d088a241e72c2fe4dd175eca7

    • SHA1

      faa14def6db42a7e4ffa912f2460faa5a02023d4

    • SHA256

      0bdaadfc0c9d1f1b5c8d9fc53cb3dd80a5c29c7dadd013d32ab8eb2d4c933bd7

    • SHA512

      2e2df9809665168ec01aa9e332b87bcc430ffb9f08bf99b35af07dc03d13b35ccda3b089b5297d46bc60f41943fe4173205d871d5912422e34d4f4f05fc3e33b

    • SSDEEP

      98304:N0tLu9Q3naazMaBk1OwP5a79kYtVYcOCs/yTspnC9Yf:qLgQXaKMWk1OG5URvVRyHpnC9Yf

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks