General

  • Target

    7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478

  • Size

    308KB

  • Sample

    220328-egkf2scber

  • MD5

    1316e7d18ac7d4f2b00115ce31b7cc32

  • SHA1

    8012ac64c5bbd3e0c93bcc9f3aa4d72dad4acd26

  • SHA256

    7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478

  • SHA512

    315c117c212e8a764db4f9c233052dfa826df25faee603e82c5beb744ad15ea6eabb6703b497675dcdf752993481ce4a36fbd2d8730b36bf2a125b243bf5c4c2

Malware Config

Extracted

Family

systembc

C2

advertrex20.xyz:4044

gentexman37.xyz:4044

Targets

    • Target

      7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478

    • Size

      308KB

    • MD5

      1316e7d18ac7d4f2b00115ce31b7cc32

    • SHA1

      8012ac64c5bbd3e0c93bcc9f3aa4d72dad4acd26

    • SHA256

      7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478

    • SHA512

      315c117c212e8a764db4f9c233052dfa826df25faee603e82c5beb744ad15ea6eabb6703b497675dcdf752993481ce4a36fbd2d8730b36bf2a125b243bf5c4c2

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query

      suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Enterprise v6

Tasks