General

  • Target

    294110e2a3b933750b662bd48e66474c8f25f7003bfc723aab453cc205a01b10

  • Size

    3.5MB

  • Sample

    241127-jedmya1jdp

  • MD5

    6127e25953cfdb8ad417b2ac7580b7cd

  • SHA1

    684515648dadac4ee6fde0ac9d11f1ff0d750248

  • SHA256

    294110e2a3b933750b662bd48e66474c8f25f7003bfc723aab453cc205a01b10

  • SHA512

    7454f84c57a6b7cdecfd9f462a40226eb32a0b718cc162aca08dfcca70d643cd54704d5a583c44ffb05821a7a9d0ff7563959db58cf5cd531f1cd24735f02da8

  • SSDEEP

    98304:NAwpJNWV3XO1KJyzStaMySUJIYUIjvq0UAso80ovZ18CY:OSJ0V3XOcIzfSwI1Ijq0Uj28r8t

Malware Config

Targets

    • Target

      294110e2a3b933750b662bd48e66474c8f25f7003bfc723aab453cc205a01b10

    • Size

      3.5MB

    • MD5

      6127e25953cfdb8ad417b2ac7580b7cd

    • SHA1

      684515648dadac4ee6fde0ac9d11f1ff0d750248

    • SHA256

      294110e2a3b933750b662bd48e66474c8f25f7003bfc723aab453cc205a01b10

    • SHA512

      7454f84c57a6b7cdecfd9f462a40226eb32a0b718cc162aca08dfcca70d643cd54704d5a583c44ffb05821a7a9d0ff7563959db58cf5cd531f1cd24735f02da8

    • SSDEEP

      98304:NAwpJNWV3XO1KJyzStaMySUJIYUIjvq0UAso80ovZ18CY:OSJ0V3XOcIzfSwI1Ijq0Uj28r8t

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks