General

  • Target

    b71b90f62e3b61d3946aa1dbcbe2ef60d18bc512349de334fd06fdcde80a9f6b

  • Size

    218KB

  • Sample

    221220-prdflacf3y

  • MD5

    0c2da48c16331136f35f0d17a8e564d1

  • SHA1

    27c4029331bf05a1317e0645c6841cc83c65c78b

  • SHA256

    b71b90f62e3b61d3946aa1dbcbe2ef60d18bc512349de334fd06fdcde80a9f6b

  • SHA512

    dcd1366b0f485725249a4ee97e699d315b7b33d53fb12c5beaf58d509cd1289c606816d2d8dc2852ac89e53251dd7aa209dcf7457bdb8807c763683f7f8155f4

  • SSDEEP

    3072:hV6JiL8pQOlHRZGF596ek/3Nscwbkuuq+7b/SNwwqNUoBNHCDml:hQJiL3Ogb9q2JluqW6mNUorCa

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      b71b90f62e3b61d3946aa1dbcbe2ef60d18bc512349de334fd06fdcde80a9f6b

    • Size

      218KB

    • MD5

      0c2da48c16331136f35f0d17a8e564d1

    • SHA1

      27c4029331bf05a1317e0645c6841cc83c65c78b

    • SHA256

      b71b90f62e3b61d3946aa1dbcbe2ef60d18bc512349de334fd06fdcde80a9f6b

    • SHA512

      dcd1366b0f485725249a4ee97e699d315b7b33d53fb12c5beaf58d509cd1289c606816d2d8dc2852ac89e53251dd7aa209dcf7457bdb8807c763683f7f8155f4

    • SSDEEP

      3072:hV6JiL8pQOlHRZGF596ek/3Nscwbkuuq+7b/SNwwqNUoBNHCDml:hQJiL3Ogb9q2JluqW6mNUorCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks