General

  • Target

    168a4450eaf205fa20bcc2d0881c830f.exe

  • Size

    6.9MB

  • Sample

    241214-chbjesvjfk

  • MD5

    168a4450eaf205fa20bcc2d0881c830f

  • SHA1

    32e77548315c9d48409057ea43e59ec4be060587

  • SHA256

    77b07095ae775cc151b3c35088384ba9dcc722b2b5fcee7fa5a933141db67b26

  • SHA512

    9c634f7e858ab4b2edb0544222e3bc1524f7fee29bb368876ade3849b33747939f183e905988d40422b5178c40eb7caa6d58f4c27f455dca89f58b61c12fbaad

  • SSDEEP

    196608:9K2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:9DY6tiP3myRfzepXe4ny8gxzj

Malware Config

Targets

    • Target

      168a4450eaf205fa20bcc2d0881c830f.exe

    • Size

      6.9MB

    • MD5

      168a4450eaf205fa20bcc2d0881c830f

    • SHA1

      32e77548315c9d48409057ea43e59ec4be060587

    • SHA256

      77b07095ae775cc151b3c35088384ba9dcc722b2b5fcee7fa5a933141db67b26

    • SHA512

      9c634f7e858ab4b2edb0544222e3bc1524f7fee29bb368876ade3849b33747939f183e905988d40422b5178c40eb7caa6d58f4c27f455dca89f58b61c12fbaad

    • SSDEEP

      196608:9K2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:9DY6tiP3myRfzepXe4ny8gxzj

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks