General

  • Target

    file.exe

  • Size

    217KB

  • Sample

    221220-n5r1gace9s

  • MD5

    159bf3c1b8387fdd3ccdc293b8d5e9d2

  • SHA1

    5b23664c1b8b6c835e5067b90e07687aab4979a4

  • SHA256

    3ac7b32c46a0fc9a6b97aaa3bb18c06c8212d8869f87f0d2bb712ffbcb826967

  • SHA512

    145435b9af204328fa2cb4f7823fe2cf74948fa7bfa1b82f910e3e9769d346dc7985730b526bc913d6286fb83de43e74d7a23c224ff3013069c9afc48ed137cf

  • SSDEEP

    3072:G1C22LVxA2/HRS3NgT79LC8OphRXrM8L77b/tQA4ANHCDml:Gg22LrA2eNg9PiIqr1yqCa

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      file.exe

    • Size

      217KB

    • MD5

      159bf3c1b8387fdd3ccdc293b8d5e9d2

    • SHA1

      5b23664c1b8b6c835e5067b90e07687aab4979a4

    • SHA256

      3ac7b32c46a0fc9a6b97aaa3bb18c06c8212d8869f87f0d2bb712ffbcb826967

    • SHA512

      145435b9af204328fa2cb4f7823fe2cf74948fa7bfa1b82f910e3e9769d346dc7985730b526bc913d6286fb83de43e74d7a23c224ff3013069c9afc48ed137cf

    • SSDEEP

      3072:G1C22LVxA2/HRS3NgT79LC8OphRXrM8L77b/tQA4ANHCDml:Gg22LrA2eNg9PiIqr1yqCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks