General

  • Target

    98ede8733638e771e396ec0e48562ce9c27595916f7a248d1ccbc4fc13f6f7f6

  • Size

    218KB

  • Sample

    221220-n1sq7shd73

  • MD5

    21c0bcafdc20d06ed7b61c1ed8f4f84c

  • SHA1

    d5673c3b26cb6e1d2670f3be381eca1793beac34

  • SHA256

    98ede8733638e771e396ec0e48562ce9c27595916f7a248d1ccbc4fc13f6f7f6

  • SHA512

    90e42d54f2eef007743ea03bb23ded489678a9beda5a9bc1aff817c25932397d65c5ed3e7eb82f51e1d90394a224c78cc44fab1c341ef72cf630b93914a2e66b

  • SSDEEP

    3072:4yP6uL95fiHRY7a0OAYehzchDMfOn7b/2uLNHCDml:4Q6uLXfTXcFDfuupCa

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      98ede8733638e771e396ec0e48562ce9c27595916f7a248d1ccbc4fc13f6f7f6

    • Size

      218KB

    • MD5

      21c0bcafdc20d06ed7b61c1ed8f4f84c

    • SHA1

      d5673c3b26cb6e1d2670f3be381eca1793beac34

    • SHA256

      98ede8733638e771e396ec0e48562ce9c27595916f7a248d1ccbc4fc13f6f7f6

    • SHA512

      90e42d54f2eef007743ea03bb23ded489678a9beda5a9bc1aff817c25932397d65c5ed3e7eb82f51e1d90394a224c78cc44fab1c341ef72cf630b93914a2e66b

    • SSDEEP

      3072:4yP6uL95fiHRY7a0OAYehzchDMfOn7b/2uLNHCDml:4Q6uLXfTXcFDfuupCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks