General

  • Target

    17b7734e0b58fd3b8a6bd38d8bfbeafa12369d66a9420b21dee0edfd8d5bfbe4

  • Size

    3.4MB

  • Sample

    241127-wtcqeatrfz

  • MD5

    3c40e2060086bf566debcac841a67aeb

  • SHA1

    e6e6ec9d744a271ee2ef8b54681e683fb3c98a7c

  • SHA256

    17b7734e0b58fd3b8a6bd38d8bfbeafa12369d66a9420b21dee0edfd8d5bfbe4

  • SHA512

    4b6f51c36e6407135ca4adf005b66f99375f0c37bbda9c18ecdce8c37a3a61686d5e6525c7a428170c5967de60b6aa4168cbeaa7aaaf03eccb1261d24a44d4d1

  • SSDEEP

    98304:NfQlAbYs8QdPMDUki+QFX417r+lbOoKbguVhV:qvrqZyN5GgbgGV

Malware Config

Targets

    • Target

      17b7734e0b58fd3b8a6bd38d8bfbeafa12369d66a9420b21dee0edfd8d5bfbe4

    • Size

      3.4MB

    • MD5

      3c40e2060086bf566debcac841a67aeb

    • SHA1

      e6e6ec9d744a271ee2ef8b54681e683fb3c98a7c

    • SHA256

      17b7734e0b58fd3b8a6bd38d8bfbeafa12369d66a9420b21dee0edfd8d5bfbe4

    • SHA512

      4b6f51c36e6407135ca4adf005b66f99375f0c37bbda9c18ecdce8c37a3a61686d5e6525c7a428170c5967de60b6aa4168cbeaa7aaaf03eccb1261d24a44d4d1

    • SSDEEP

      98304:NfQlAbYs8QdPMDUki+QFX417r+lbOoKbguVhV:qvrqZyN5GgbgGV

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks