General

  • Target

    d53e734f9a4bad2b0d36b7484cb445bd377192a77ddb0d753d5aa1d14e9db078.exe

  • Size

    2.0MB

  • Sample

    250318-kq5fgaytas

  • MD5

    d85357190e6be1331036f8cf9225d5c2

  • SHA1

    f5c994accc9fc16df9cd4f3e9e13fdea952c17be

  • SHA256

    d53e734f9a4bad2b0d36b7484cb445bd377192a77ddb0d753d5aa1d14e9db078

  • SHA512

    82dbbd85980edda224365afca6cd75a5f18c4d967a20aec7b2d180f559a90e3772a8c125cb59f03f7465bfee60b42cb93ed037a202f0e7c1bc7c68385430aa0c

  • SSDEEP

    49152:32VR72rAMT8ztu+OmTPjrF13w6GCDiIXSMr09sYe7D:mVR72cMT8zt8sF13wDCDiarQbc

Malware Config

Extracted

Family

socks5systemz

C2

buujmxe.com

http://buujmxe.com/search/?q=67e28dd86c0ba1284009f91c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f171ea771795af8e05c64bdb22f31df92d8b38e316a667d307eca743ec4c2b07b52966923f658cf716c8ed91

http://buujmxe.com/search/?q=67e28dd86c0ba1284009f91c7c27d78406abdd88be4b12eab517aa5c96bd86ef92814c845a8bbc896c58e713bc90c91936b5281fc235a925ed3e52d6bd974a95129070b618e96cc92be20ea778c255bbe258b90d3b4eed3233d1626a8ff815c2ed9d9d33cf6b

dlboehv.info

http://dlboehv.info/search/?q=67e28dd86e5ef12f1358fa4b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ee8889b5e4fa9281ae978f271ea771795af8e05c64bdb22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608afd13c8e89d9838

Targets

    • Target

      d53e734f9a4bad2b0d36b7484cb445bd377192a77ddb0d753d5aa1d14e9db078.exe

    • Size

      2.0MB

    • MD5

      d85357190e6be1331036f8cf9225d5c2

    • SHA1

      f5c994accc9fc16df9cd4f3e9e13fdea952c17be

    • SHA256

      d53e734f9a4bad2b0d36b7484cb445bd377192a77ddb0d753d5aa1d14e9db078

    • SHA512

      82dbbd85980edda224365afca6cd75a5f18c4d967a20aec7b2d180f559a90e3772a8c125cb59f03f7465bfee60b42cb93ed037a202f0e7c1bc7c68385430aa0c

    • SSDEEP

      49152:32VR72rAMT8ztu+OmTPjrF13w6GCDiIXSMr09sYe7D:mVR72cMT8zt8sF13wDCDiarQbc

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.