General

  • Target

    f2d616b768d48f1a65d7f711be17c167f39f8613ef2a2ab2eb0304fd5ff090b0

  • Size

    218KB

  • Sample

    221220-qjd8lacg3w

  • MD5

    516059c6a43a73e03a337ceb950e5113

  • SHA1

    7709ea15a4502216d00858a90d6e2e3a1cf9dcf4

  • SHA256

    f2d616b768d48f1a65d7f711be17c167f39f8613ef2a2ab2eb0304fd5ff090b0

  • SHA512

    361f769cfa1a9fdffb00a01c2d3c8c6ae695f2ef74505d6249df910f545a3ccf38db0d4616c93dc4efb49ebbd1c2067988a6daf8730bc71eb37c07b0eb301a2b

  • SSDEEP

    3072:jMJ14L7gIGHRhoezyInVwxmw4LTVtGLFh01uLBql7b/WoQNHCDml:jE14LsI49nVSmw4Lpa01utqVeNCa

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      f2d616b768d48f1a65d7f711be17c167f39f8613ef2a2ab2eb0304fd5ff090b0

    • Size

      218KB

    • MD5

      516059c6a43a73e03a337ceb950e5113

    • SHA1

      7709ea15a4502216d00858a90d6e2e3a1cf9dcf4

    • SHA256

      f2d616b768d48f1a65d7f711be17c167f39f8613ef2a2ab2eb0304fd5ff090b0

    • SHA512

      361f769cfa1a9fdffb00a01c2d3c8c6ae695f2ef74505d6249df910f545a3ccf38db0d4616c93dc4efb49ebbd1c2067988a6daf8730bc71eb37c07b0eb301a2b

    • SSDEEP

      3072:jMJ14L7gIGHRhoezyInVwxmw4LTVtGLFh01uLBql7b/WoQNHCDml:jE14LsI49nVSmw4Lpa01utqVeNCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks