General
-
Target
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478
-
Size
308KB
-
Sample
220328-egkf2scber
-
MD5
1316e7d18ac7d4f2b00115ce31b7cc32
-
SHA1
8012ac64c5bbd3e0c93bcc9f3aa4d72dad4acd26
-
SHA256
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478
-
SHA512
315c117c212e8a764db4f9c233052dfa826df25faee603e82c5beb744ad15ea6eabb6703b497675dcdf752993481ce4a36fbd2d8730b36bf2a125b243bf5c4c2
Static task
static1
Behavioral task
behavioral1
Sample
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478.exe
Resource
win7-20220331-en
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Targets
-
-
Target
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478
-
Size
308KB
-
MD5
1316e7d18ac7d4f2b00115ce31b7cc32
-
SHA1
8012ac64c5bbd3e0c93bcc9f3aa4d72dad4acd26
-
SHA256
7180bbdc3ec4a9ce298d39e9ecf5bfb1e818f749299cb5ebeb00e60503798478
-
SHA512
315c117c212e8a764db4f9c233052dfa826df25faee603e82c5beb744ad15ea6eabb6703b497675dcdf752993481ce4a36fbd2d8730b36bf2a125b243bf5c4c2
-
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-