General

  • Target

    7700eba1ceaa134b1da16d1ede0e7894.exe

  • Size

    6.9MB

  • Sample

    241214-3xwe9axres

  • MD5

    7700eba1ceaa134b1da16d1ede0e7894

  • SHA1

    d591222916193a3bcaef009eae37fc60acbff924

  • SHA256

    87324fceb64682470429276f1766671ad250163a2404b7b7df6f4d25007a1df0

  • SHA512

    571691b0c5af9d912814de97e0db6523a2d7ea73e0ad6ff128f0e16d1d3d724df370bb856f1f59cf09145963c0fe7f2d1ee6dc3453e3ce39a567a14724c3c9e0

  • SSDEEP

    98304:w+koiRLFdsODKUdFxQ8k618KzAYYC9z3Bbgtev25o40nsZJjNw5MQNiEU4P5EKHl:xz25G6bV1yYDuZxCWQNhUU2uNzj

Malware Config

Targets

    • Target

      7700eba1ceaa134b1da16d1ede0e7894.exe

    • Size

      6.9MB

    • MD5

      7700eba1ceaa134b1da16d1ede0e7894

    • SHA1

      d591222916193a3bcaef009eae37fc60acbff924

    • SHA256

      87324fceb64682470429276f1766671ad250163a2404b7b7df6f4d25007a1df0

    • SHA512

      571691b0c5af9d912814de97e0db6523a2d7ea73e0ad6ff128f0e16d1d3d724df370bb856f1f59cf09145963c0fe7f2d1ee6dc3453e3ce39a567a14724c3c9e0

    • SSDEEP

      98304:w+koiRLFdsODKUdFxQ8k618KzAYYC9z3Bbgtev25o40nsZJjNw5MQNiEU4P5EKHl:xz25G6bV1yYDuZxCWQNhUU2uNzj

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks