General

  • Target

    5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7

  • Size

    218KB

  • Sample

    221220-qh43macg21

  • MD5

    16b1904a41d5a106d93914dd3e6e71be

  • SHA1

    4f2a08f73cfe51f363760578588b19765eb36ec8

  • SHA256

    5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7

  • SHA512

    3a75d7d713b6382cc4720003bb8cfc7e2814ad9478ef7d6ded0f5b3bdfc59d6e5a7fda10fab7cd9a2231f57683e199fe7954e0e4ec19fc54c6ff8b42a2928e9a

  • SSDEEP

    3072:+NCxFYH1LI/4GHR7uvUZi6eVwCll7c58u7b/fOp2NHCDml:+02VLk40AUQcsc58mHkECa

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7

    • Size

      218KB

    • MD5

      16b1904a41d5a106d93914dd3e6e71be

    • SHA1

      4f2a08f73cfe51f363760578588b19765eb36ec8

    • SHA256

      5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7

    • SHA512

      3a75d7d713b6382cc4720003bb8cfc7e2814ad9478ef7d6ded0f5b3bdfc59d6e5a7fda10fab7cd9a2231f57683e199fe7954e0e4ec19fc54c6ff8b42a2928e9a

    • SSDEEP

      3072:+NCxFYH1LI/4GHR7uvUZi6eVwCll7c58u7b/fOp2NHCDml:+02VLk40AUQcsc58mHkECa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks