General

  • Target

    ec7b2cd04228626c74372d58aa236b765d254afa4ec47723c514f256dde1750e

  • Size

    87KB

  • Sample

    220427-whmfgaffc9

  • MD5

    5781e34d8a456b34ad9d8f7ed8bf9453

  • SHA1

    778cdb0dfbfc4651cedaa985505dd28a33d190aa

  • SHA256

    ec7b2cd04228626c74372d58aa236b765d254afa4ec47723c514f256dde1750e

  • SHA512

    e925c9b9c06249b12d4eaea21c9458668e57d2a7cb9f87625f8a10468ec6e4f70cf97b4e9a63299c939a16b546a6d28bb180b0c5b6de45b3739c002920989af3

Malware Config

Extracted

Family

systembc

C2

asdasd08.com:4039

asdasd08.xyz:4039

Targets

    • Target

      ec7b2cd04228626c74372d58aa236b765d254afa4ec47723c514f256dde1750e

    • Size

      87KB

    • MD5

      5781e34d8a456b34ad9d8f7ed8bf9453

    • SHA1

      778cdb0dfbfc4651cedaa985505dd28a33d190aa

    • SHA256

      ec7b2cd04228626c74372d58aa236b765d254afa4ec47723c514f256dde1750e

    • SHA512

      e925c9b9c06249b12d4eaea21c9458668e57d2a7cb9f87625f8a10468ec6e4f70cf97b4e9a63299c939a16b546a6d28bb180b0c5b6de45b3739c002920989af3

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query

      suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Connection Proxy

1
T1090

Tasks