General

  • Target

    fd710dcf20f70aa20147e7ccc428cd7d9a4373f650f51d1903ed0dd29169869d.exe

  • Size

    4.3MB

  • Sample

    250318-2y7z1atjs3

  • MD5

    7b5c9c816277ce3e0ab2c2987e2fb17d

  • SHA1

    38d830f6b5cfe60ffc1ac3194c84f53d28afa063

  • SHA256

    fd710dcf20f70aa20147e7ccc428cd7d9a4373f650f51d1903ed0dd29169869d

  • SHA512

    a24ba544c500446eced652f945618abf48f9898ef68070441fed894aa8a2853312b3a9e691ddd44c8dcf4013e723df40c7b104cdf2a0acbb839b78ba841b6e05

  • SSDEEP

    98304:cRW2fva4Yxwp0BT7o0OaCs4qcezx9IAAfdwUnvJG7Ly/E3Nm44mhjgc0Gft4IbB+:mXHYpB2Zqcex9DABn4b3NmYjlXVLv6

Malware Config

Extracted

Family

socks5systemz

C2

bwqbiel.com

http://bwqbiel.com/search/?q=67e28dd83a5ca421460bad497c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a371ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923f658dfc19c8e69d

http://bwqbiel.com/search/?q=67e28dd83a5ca421460bad497c27d78406abdd88be4b12eab517aa5c96bd86e9948e48875a8bbc896c58e713bc90c91936b5281fc235a925ed3e00d6bd974a95129070b616e96cc92be20ea778c255bbe258b90d3b4eed3233d1626a8ff815c2ec969233c467

ddnotow.info

http://ddnotow.info/search/?q=67e28dd86558fa2d4658af497c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ee8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608afd12c3e79c9a3f

Targets

    • Target

      fd710dcf20f70aa20147e7ccc428cd7d9a4373f650f51d1903ed0dd29169869d.exe

    • Size

      4.3MB

    • MD5

      7b5c9c816277ce3e0ab2c2987e2fb17d

    • SHA1

      38d830f6b5cfe60ffc1ac3194c84f53d28afa063

    • SHA256

      fd710dcf20f70aa20147e7ccc428cd7d9a4373f650f51d1903ed0dd29169869d

    • SHA512

      a24ba544c500446eced652f945618abf48f9898ef68070441fed894aa8a2853312b3a9e691ddd44c8dcf4013e723df40c7b104cdf2a0acbb839b78ba841b6e05

    • SSDEEP

      98304:cRW2fva4Yxwp0BT7o0OaCs4qcezx9IAAfdwUnvJG7Ly/E3Nm44mhjgc0Gft4IbB+:mXHYpB2Zqcex9DABn4b3NmYjlXVLv6

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.