General
-
Target
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da
-
Size
285KB
-
Sample
220326-h8wj6seefn
-
MD5
d1cd66d2dca341712b4c6e15649d4a8e
-
SHA1
8cde8dd0bd6271a55fb4de53713255d294ca1b80
-
SHA256
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da
-
SHA512
39c7be90423d291ea73ee08704024a741cd68e395f46de33d16d2e538a99f4ca58c35f998376814203606e634121fd973311a9621b77e0ab66afb144db32d1e9
Static task
static1
Behavioral task
behavioral1
Sample
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da.exe
Resource
win7-20220311-en
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Targets
-
-
Target
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da
-
Size
285KB
-
MD5
d1cd66d2dca341712b4c6e15649d4a8e
-
SHA1
8cde8dd0bd6271a55fb4de53713255d294ca1b80
-
SHA256
a33bce78c3d2f661f520dfd920567413fdc6c9a213c3d0f6a574f0d9ffa6e6da
-
SHA512
39c7be90423d291ea73ee08704024a741cd68e395f46de33d16d2e538a99f4ca58c35f998376814203606e634121fd973311a9621b77e0ab66afb144db32d1e9
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-