General
-
Target
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565
-
Size
285KB
-
Sample
220326-atjytsahfq
-
MD5
ff4d95122ba0a03ff9b3f5b367f96b35
-
SHA1
131e0b509ef92ba9ab6eeebd1e1571bbbe6a1cf2
-
SHA256
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565
-
SHA512
215285c7c8d8d77be59469c28a31ef1e1536867e3a24e2470b7acb34253f5f555ca2230c1f78fd16da68fad7e587edbac47b8d2588ffde0513a506dce3fe1cfb
Static task
static1
Behavioral task
behavioral1
Sample
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565.exe
Resource
win7-20220310-en
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Targets
-
-
Target
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565
-
Size
285KB
-
MD5
ff4d95122ba0a03ff9b3f5b367f96b35
-
SHA1
131e0b509ef92ba9ab6eeebd1e1571bbbe6a1cf2
-
SHA256
89fe7c1bbb477cee16d340a65fe5199f1a56199bec22dd8af394aac88dd63565
-
SHA512
215285c7c8d8d77be59469c28a31ef1e1536867e3a24e2470b7acb34253f5f555ca2230c1f78fd16da68fad7e587edbac47b8d2588ffde0513a506dce3fe1cfb
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-