General

  • Target

    b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979

  • Size

    214KB

  • Sample

    221220-q9pf9ach7v

  • MD5

    e4de9546e6536c619d39dfd8861bfc0a

  • SHA1

    a7bad7df8d7865638640ba93dd44a08069c28bc6

  • SHA256

    b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979

  • SHA512

    3776fb02a698990d16e2f4bc149c86cb5646ea21ba114329c19f68905fb02458bc1d1a7e6f7e6490e316f15576857e361cbd3827d0f2b022b77016eee529b5fe

  • SSDEEP

    3072:nQL8A7R9tnNOrEO8Uzvek/QwKw3vq57b/dCE57VPmsNHCDml:QL8qzgEOfzj/RKgQFJV9Ca

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979

    • Size

      214KB

    • MD5

      e4de9546e6536c619d39dfd8861bfc0a

    • SHA1

      a7bad7df8d7865638640ba93dd44a08069c28bc6

    • SHA256

      b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979

    • SHA512

      3776fb02a698990d16e2f4bc149c86cb5646ea21ba114329c19f68905fb02458bc1d1a7e6f7e6490e316f15576857e361cbd3827d0f2b022b77016eee529b5fe

    • SSDEEP

      3072:nQL8A7R9tnNOrEO8Uzvek/QwKw3vq57b/dCE57VPmsNHCDml:QL8qzgEOfzj/RKgQFJV9Ca

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks