General

  • Target

    1339d8437b13ceca77e24912f9c3fe11e30b32f71bc7da03c4f86a4c8a218453.zip

  • Size

    111KB

  • Sample

    221121-nacx3abf41

  • MD5

    99fcc8ae499aad5e418951ce80e49691

  • SHA1

    530621493fbb465046440bf5bdd2c2fc66431802

  • SHA256

    1099f00401095f8046173ee1839268113ed560c0fa378854589c09ebf56d77b2

  • SHA512

    fd319985bc7894181c0f742c20a214bd56d6b478144c5daa35a026cec7904fa5bc6a03e881365941735af5ceec00c615e2257fc442d42f59cd0c98ca45b45761

  • SSDEEP

    3072:qlKRE70ydVOKwPEmcEw+chIBxeQqLH+TFy9Cr:qg+wbc+OInqLHyFrr

Malware Config

Extracted

Family

systembc

C2

89.248.163.218:443

Targets

    • Target

      1339d8437b13ceca77e24912f9c3fe11e30b32f71bc7da03c4f86a4c8a218453.exe

    • Size

      163KB

    • MD5

      b4d551e1ae248fd9bbf157e5c8b9a1a9

    • SHA1

      adf99319734136d0c619dcbb089fa4d4743ae239

    • SHA256

      1339d8437b13ceca77e24912f9c3fe11e30b32f71bc7da03c4f86a4c8a218453

    • SHA512

      584fca9677747ccde53d82faca59938a5f353671eca9248f711e93b29852b8aa952ae6fc055107a4a1fc2c9e95bfa1f8adb1d4b38888c2a3bc09e29e189c741e

    • SSDEEP

      3072:Eakj1CJOHiPNYH5vuncNz5X2LMTXMmg8cmoxJ/1T:ERCe4Npyz5X2LpmgvmoJ/

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks