General

  • Target

    f8cb920f9d119192a5cfa2c207dc91a8b8878072682722901e1d6739ce8aa8e0

  • Size

    3.6MB

  • Sample

    241129-ryf66svndl

  • MD5

    3e7eb4bc28a82c80ec0ee6dee1bcacba

  • SHA1

    a0f35dac1db294e2e98489b724123ca3b230eb75

  • SHA256

    f8cb920f9d119192a5cfa2c207dc91a8b8878072682722901e1d6739ce8aa8e0

  • SHA512

    187584a9d7aed755438d84cdf3c6421ad227db13a6ec530fb35568188b38307fffbdb7d9af14aab373906cec17794f6eb9e549c102157a23b6c389b30c4d430d

  • SSDEEP

    98304:Ny2hw2wywnhOiA6Uaz5YA8jli3jdE/ZdcZGlJ8Kc/IVK:Uawfh5USjjdE/TcUlJ9UL

Malware Config

Targets

    • Target

      f8cb920f9d119192a5cfa2c207dc91a8b8878072682722901e1d6739ce8aa8e0

    • Size

      3.6MB

    • MD5

      3e7eb4bc28a82c80ec0ee6dee1bcacba

    • SHA1

      a0f35dac1db294e2e98489b724123ca3b230eb75

    • SHA256

      f8cb920f9d119192a5cfa2c207dc91a8b8878072682722901e1d6739ce8aa8e0

    • SHA512

      187584a9d7aed755438d84cdf3c6421ad227db13a6ec530fb35568188b38307fffbdb7d9af14aab373906cec17794f6eb9e549c102157a23b6c389b30c4d430d

    • SSDEEP

      98304:Ny2hw2wywnhOiA6Uaz5YA8jli3jdE/ZdcZGlJ8Kc/IVK:Uawfh5USjjdE/TcUlJ9UL

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks