General

  • Target

    f08f680f17aaf9505a8d53648545ce684af9b39a90a8dc9d2e872693e1d59b45.exe

  • Size

    6.9MB

  • Sample

    241215-eqvy5svqhr

  • MD5

    1015b0b5cfddfbc4baea6910d9c56c3c

  • SHA1

    9fe1cae9d38a53a1217556c60ffd3c02d8235d66

  • SHA256

    f08f680f17aaf9505a8d53648545ce684af9b39a90a8dc9d2e872693e1d59b45

  • SHA512

    536455cbd7a0240bb4608901c168826dadc4609132f07041bf6b4ac295b158f7cdf1be22790ee5776f80bbbc2bf4b4a13431375a7312b8f7afc05a13e22f2ecf

  • SSDEEP

    196608:gK2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:gDY6tiP3myRfzepXe4ny8gxzj

Malware Config

Targets

    • Target

      f08f680f17aaf9505a8d53648545ce684af9b39a90a8dc9d2e872693e1d59b45.exe

    • Size

      6.9MB

    • MD5

      1015b0b5cfddfbc4baea6910d9c56c3c

    • SHA1

      9fe1cae9d38a53a1217556c60ffd3c02d8235d66

    • SHA256

      f08f680f17aaf9505a8d53648545ce684af9b39a90a8dc9d2e872693e1d59b45

    • SHA512

      536455cbd7a0240bb4608901c168826dadc4609132f07041bf6b4ac295b158f7cdf1be22790ee5776f80bbbc2bf4b4a13431375a7312b8f7afc05a13e22f2ecf

    • SSDEEP

      196608:gK2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:gDY6tiP3myRfzepXe4ny8gxzj

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks