General

  • Target

    1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b

  • Size

    3.4MB

  • Sample

    241127-twaygsxlep

  • MD5

    3be5f85f734034f7434b81d0ffa30642

  • SHA1

    dd5e6fcf19f1b857ce759f244b63779d01d0be01

  • SHA256

    1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b

  • SHA512

    7b5967f8c066033734e35a48a08d09315e12b91de68237816ee8342281401da4bcfeb9dd8f73fbb8acbf074a89a91beb99c0b09964e84099d107e9d41cf96d61

  • SSDEEP

    98304:NQd+2EUCV8h7uA6ywMQXP09P2uL955W7tML1hc:OMjUCK6ywMQ/0dNLZc

Malware Config

Targets

    • Target

      1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b

    • Size

      3.4MB

    • MD5

      3be5f85f734034f7434b81d0ffa30642

    • SHA1

      dd5e6fcf19f1b857ce759f244b63779d01d0be01

    • SHA256

      1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b

    • SHA512

      7b5967f8c066033734e35a48a08d09315e12b91de68237816ee8342281401da4bcfeb9dd8f73fbb8acbf074a89a91beb99c0b09964e84099d107e9d41cf96d61

    • SSDEEP

      98304:NQd+2EUCV8h7uA6ywMQXP09P2uL955W7tML1hc:OMjUCK6ywMQ/0dNLZc

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks