General

  • Target

    929f74ddaed10d2e9092d78faaeb68b5d3536b232c4857be907e58f1f51de53b

  • Size

    327KB

  • Sample

    221215-l151escb34

  • MD5

    358da96cd7e8ffe8a6fbd1cb26642fea

  • SHA1

    cb8cc3d0354ff2f1621579c19ae61716e9a67abb

  • SHA256

    929f74ddaed10d2e9092d78faaeb68b5d3536b232c4857be907e58f1f51de53b

  • SHA512

    70219df6f3f3e7d7ab7e4962ba08b031bf3baaa20552c4bfbf4c8522739232df89823ed298ddff4f78e96fea98d90d34fcd254e647703329651890c5d508617a

  • SSDEEP

    3072:kVYo2LludyTd5T12JP16rL5eRFvig0ua2OB38YnX4WSbKf+nffPxudNj4fEgsBtb:kYo2LAsD12N16pcFWjb3Sbjfxur/tb

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      929f74ddaed10d2e9092d78faaeb68b5d3536b232c4857be907e58f1f51de53b

    • Size

      327KB

    • MD5

      358da96cd7e8ffe8a6fbd1cb26642fea

    • SHA1

      cb8cc3d0354ff2f1621579c19ae61716e9a67abb

    • SHA256

      929f74ddaed10d2e9092d78faaeb68b5d3536b232c4857be907e58f1f51de53b

    • SHA512

      70219df6f3f3e7d7ab7e4962ba08b031bf3baaa20552c4bfbf4c8522739232df89823ed298ddff4f78e96fea98d90d34fcd254e647703329651890c5d508617a

    • SSDEEP

      3072:kVYo2LludyTd5T12JP16rL5eRFvig0ua2OB38YnX4WSbKf+nffPxudNj4fEgsBtb:kYo2LAsD12N16pcFWjb3Sbjfxur/tb

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Tasks