General

  • Target

    89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565

  • Size

    285KB

  • Sample

    220326-atjytsahfq

  • MD5

    ff4d95122ba0a03ff9b3f5b367f96b35

  • SHA1

    131e0b509ef92ba9ab6eeebd1e1571bbbe6a1cf2

  • SHA256

    89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565

  • SHA512

    215285c7c8d8d77be59469c28a31ef1e1536867e3a24e2470b7acb34253f5f555ca2230c1f78fd16da68fad7e587edbac47b8d2588ffde0513a506dce3fe1cfb

Malware Config

Extracted

Family

systembc

C2

advertrex20.xyz:4044

gentexman37.xyz:4044

Targets

    • Target

      89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565

    • Size

      285KB

    • MD5

      ff4d95122ba0a03ff9b3f5b367f96b35

    • SHA1

      131e0b509ef92ba9ab6eeebd1e1571bbbe6a1cf2

    • SHA256

      89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565

    • SHA512

      215285c7c8d8d77be59469c28a31ef1e1536867e3a24e2470b7acb34253f5f555ca2230c1f78fd16da68fad7e587edbac47b8d2588ffde0513a506dce3fe1cfb

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query

      suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Enterprise v6

Tasks