Resubmissions

22-02-2023 10:35

230222-mmyvmacf6x 10

22-02-2023 10:19

230222-mcwmhscf3y 6

General

  • Target

    40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b.exe

  • Size

    7.2MB

  • Sample

    230222-mmyvmacf6x

  • MD5

    9606143c857bbfe1b1da8e3d1fa9ae0e

  • SHA1

    cb3a1b1d8e6acbe46c96b5b159a7be2d372b3cc6

  • SHA256

    40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b

  • SHA512

    2e118c618265b8769b15dff8add661c60f17afd46365773ca22e359b03a765c83a7f316057045293a71b53a889771fadf54e6ac1ee3fd9b3a7437f266f8af08b

  • SSDEEP

    196608:jeuNPzUCugRPeW7R9dGfqEjirb49GOD2MpkB:CmZB77R9d0q1A9GLM

Malware Config

Extracted

Family

systembc

C2

31.222.238.58:4280

192.168.1.28:4280

Targets

    • Target

      40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b.exe

    • Size

      7.2MB

    • MD5

      9606143c857bbfe1b1da8e3d1fa9ae0e

    • SHA1

      cb3a1b1d8e6acbe46c96b5b159a7be2d372b3cc6

    • SHA256

      40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b

    • SHA512

      2e118c618265b8769b15dff8add661c60f17afd46365773ca22e359b03a765c83a7f316057045293a71b53a889771fadf54e6ac1ee3fd9b3a7437f266f8af08b

    • SSDEEP

      196608:jeuNPzUCugRPeW7R9dGfqEjirb49GOD2MpkB:CmZB77R9d0q1A9GLM

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Tasks