General

  • Target

    5b9c4eb3b57004c472245f3483fe5065f47b992543ff0d7ce3aaf100ab59088f

  • Size

    4.1MB

  • Sample

    241201-tpg38azpfn

  • MD5

    08b4f4533262033c2a77f079c9c72949

  • SHA1

    4f82986f1c055d475374b4f6168f7a7bcdcfe50a

  • SHA256

    5b9c4eb3b57004c472245f3483fe5065f47b992543ff0d7ce3aaf100ab59088f

  • SHA512

    fe3a012ac1deec8871550a2127810c5077ac8ad22503641073a10f99ac9791ea856fc331e123f0b11dcba3fbdf0d9ab56264a9287332ed7c9cdec26391096dce

  • SSDEEP

    98304:MjzaB5KUu8ppKNBqV7xv8f5+j720l8PQH2YO5VIuvuunu5+:CaqBEpKHq38fw32LvYw5fnu5+

Malware Config

Targets

    • Target

      5b9c4eb3b57004c472245f3483fe5065f47b992543ff0d7ce3aaf100ab59088f

    • Size

      4.1MB

    • MD5

      08b4f4533262033c2a77f079c9c72949

    • SHA1

      4f82986f1c055d475374b4f6168f7a7bcdcfe50a

    • SHA256

      5b9c4eb3b57004c472245f3483fe5065f47b992543ff0d7ce3aaf100ab59088f

    • SHA512

      fe3a012ac1deec8871550a2127810c5077ac8ad22503641073a10f99ac9791ea856fc331e123f0b11dcba3fbdf0d9ab56264a9287332ed7c9cdec26391096dce

    • SSDEEP

      98304:MjzaB5KUu8ppKNBqV7xv8f5+j720l8PQH2YO5VIuvuunu5+:CaqBEpKHq38fw32LvYw5fnu5+

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks