General

  • Target

    9edeee6085d9b638b05597aa5e5bd1da.exe

  • Size

    326KB

  • Sample

    210527-3myns4lm5j

  • MD5

    9edeee6085d9b638b05597aa5e5bd1da

  • SHA1

    032d3d331bce8dc9871c07a1c6532c5154d52eeb

  • SHA256

    b945e05ea2847ee0d38aebe79dd5824bee6286e165c97e67d063dd4697ff1a82

  • SHA512

    a8c5d388c01bd76c2b5fcaf47f29b318d2cc7dbdd299d7e6c8c05802cbb08b7f133f01ba652c008c0b26fc02e4fac3c56648cf874f8f5be072ae04f6e7f1c84e

Score
10/10

Malware Config

Extracted

Family

systembc

C2

89.203.249.203:4035

gamelom20.com:4035

Targets

    • Target

      9edeee6085d9b638b05597aa5e5bd1da.exe

    • Size

      326KB

    • MD5

      9edeee6085d9b638b05597aa5e5bd1da

    • SHA1

      032d3d331bce8dc9871c07a1c6532c5154d52eeb

    • SHA256

      b945e05ea2847ee0d38aebe79dd5824bee6286e165c97e67d063dd4697ff1a82

    • SHA512

      a8c5d388c01bd76c2b5fcaf47f29b318d2cc7dbdd299d7e6c8c05802cbb08b7f133f01ba652c008c0b26fc02e4fac3c56648cf874f8f5be072ae04f6e7f1c84e

    Score
    10/10
    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks