General

  • Target

    36b9570a14ac21869cad456713714940

  • Size

    144KB

  • Sample

    210624-ebxa3dkb7n

  • MD5

    36b9570a14ac21869cad456713714940

  • SHA1

    17ce33e58167a089b7e4e6c49a362a23364d30de

  • SHA256

    6843226fd84ae2ce783119d4ba634e00d10dc6e5374a23d26b42cd0e7e6b18cd

  • SHA512

    4af43e89ca22fd81365f6e68a1350400cc653d3d12e642ed04bceb1597be9ce89f857c851b14390b3aad3c8b89d69235cad20b8c30a8d93b74b93f6339393bd9

Malware Config

Extracted

Family

systembc

C2

65.21.93.53:4173

95.216.118.223:4173

Targets

    • Target

      36b9570a14ac21869cad456713714940

    • Size

      144KB

    • MD5

      36b9570a14ac21869cad456713714940

    • SHA1

      17ce33e58167a089b7e4e6c49a362a23364d30de

    • SHA256

      6843226fd84ae2ce783119d4ba634e00d10dc6e5374a23d26b42cd0e7e6b18cd

    • SHA512

      4af43e89ca22fd81365f6e68a1350400cc653d3d12e642ed04bceb1597be9ce89f857c851b14390b3aad3c8b89d69235cad20b8c30a8d93b74b93f6339393bd9

    • Modifies Windows Defender Real-time Protection settings

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Nirsoft

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

5
T1112

Disabling Security Tools

4
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks