General

  • Target

    e21170857794e9f02ccaecc677f3eafe4fca98541f8ef1fa872dc9b66247af83

  • Size

    29KB

  • Sample

    221220-qvskcshf36

  • MD5

    f5e4bdb329cb29c3abb5d8419a027a3c

  • SHA1

    d832c3cc51283c494ce27b522747961f1386e05f

  • SHA256

    e21170857794e9f02ccaecc677f3eafe4fca98541f8ef1fa872dc9b66247af83

  • SHA512

    104569cac6658594398e24b3cad975d069abd4ebe06722a949df087c79af315518fbd897923adde011d1ac06e66ffbc1360fcf5af8911563992f4436f809184a

  • SSDEEP

    768:0BCzbIqVpKx3Vy2C0Jjfp/zX+Y9Kw5LG3OILRSwEqqmhAZPg5W:0+Iqqx3VyExprXl9Kw5LGBcPma0W

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Targets

    • Target

      e21170857794e9f02ccaecc677f3eafe4fca98541f8ef1fa872dc9b66247af83

    • Size

      29KB

    • MD5

      f5e4bdb329cb29c3abb5d8419a027a3c

    • SHA1

      d832c3cc51283c494ce27b522747961f1386e05f

    • SHA256

      e21170857794e9f02ccaecc677f3eafe4fca98541f8ef1fa872dc9b66247af83

    • SHA512

      104569cac6658594398e24b3cad975d069abd4ebe06722a949df087c79af315518fbd897923adde011d1ac06e66ffbc1360fcf5af8911563992f4436f809184a

    • SSDEEP

      768:0BCzbIqVpKx3Vy2C0Jjfp/zX+Y9Kw5LG3OILRSwEqqmhAZPg5W:0+Iqqx3VyExprXl9Kw5LGBcPma0W

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks