General

  • Target

    65baf6f97e9206c572b743fb7eadc5ddf9adc3fbb5857c73ae2b4b77affc7b72

  • Size

    238KB

  • Sample

    221212-semqaabf39

  • MD5

    968905a62a1aaff517ec51a0f86b06d7

  • SHA1

    d2baea0842e6df4f8a1924cc1c1efdd48c24fadb

  • SHA256

    65baf6f97e9206c572b743fb7eadc5ddf9adc3fbb5857c73ae2b4b77affc7b72

  • SHA512

    aa248fb6a89c216ba93a1c63d07532552874be8ada65674c9b9c606400cac1963ee48e9ae7716e72549c847c4e07db2f13b1011ed4a54ff8fe60bc0ecac94406

  • SSDEEP

    3072:7+5WLzpe327C9OJr5qK9pnTqObiFKrpJadvohdBcf0E0OTkRbR8pgX:hLzD7C9Oykpn/iFMp6voyftmcpgX

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      65baf6f97e9206c572b743fb7eadc5ddf9adc3fbb5857c73ae2b4b77affc7b72

    • Size

      238KB

    • MD5

      968905a62a1aaff517ec51a0f86b06d7

    • SHA1

      d2baea0842e6df4f8a1924cc1c1efdd48c24fadb

    • SHA256

      65baf6f97e9206c572b743fb7eadc5ddf9adc3fbb5857c73ae2b4b77affc7b72

    • SHA512

      aa248fb6a89c216ba93a1c63d07532552874be8ada65674c9b9c606400cac1963ee48e9ae7716e72549c847c4e07db2f13b1011ed4a54ff8fe60bc0ecac94406

    • SSDEEP

      3072:7+5WLzpe327C9OJr5qK9pnTqObiFKrpJadvohdBcf0E0OTkRbR8pgX:hLzD7C9Oykpn/iFMp6voyftmcpgX

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks