General

  • Target

    04768fec909a41d9908a9a1ee4827e2f5debee21445be37c280bc8514c543c7b

  • Size

    3.9MB

  • Sample

    241201-tg5vbaznbp

  • MD5

    b550e3dc4795f15c0bfebd24cb130ce7

  • SHA1

    7af5b5727b303d36d3255eda769c1d1bf2c57518

  • SHA256

    04768fec909a41d9908a9a1ee4827e2f5debee21445be37c280bc8514c543c7b

  • SHA512

    641ccf1c98203b67b80ce754dae545b4b965d427e5825c5c4815daf870c70efae24668c685da3e2fef5dccd069328c30bd90b67e4b3357d52e28512c42bdbb11

  • SSDEEP

    98304:M8rOytC3sPj55uOnZtpwOy42bE/cNlZFp6RCBKAJq:tTN5DZtysOE/ovqRsKAA

Malware Config

Targets

    • Target

      04768fec909a41d9908a9a1ee4827e2f5debee21445be37c280bc8514c543c7b

    • Size

      3.9MB

    • MD5

      b550e3dc4795f15c0bfebd24cb130ce7

    • SHA1

      7af5b5727b303d36d3255eda769c1d1bf2c57518

    • SHA256

      04768fec909a41d9908a9a1ee4827e2f5debee21445be37c280bc8514c543c7b

    • SHA512

      641ccf1c98203b67b80ce754dae545b4b965d427e5825c5c4815daf870c70efae24668c685da3e2fef5dccd069328c30bd90b67e4b3357d52e28512c42bdbb11

    • SSDEEP

      98304:M8rOytC3sPj55uOnZtpwOy42bE/cNlZFp6RCBKAJq:tTN5DZtysOE/ovqRsKAA

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks