General

  • Target

    e66dec71ef0ffbb33127f41b8ab1fe3e.exe

  • Size

    1.5MB

  • Sample

    230623-p2b1hsgc2w

  • MD5

    e66dec71ef0ffbb33127f41b8ab1fe3e

  • SHA1

    719e12ef09b6e3ab747421946a57739a649cf483

  • SHA256

    240ff64b312acf203a1498a58801bf79ad99617e7dbf961c6a289531d1b7b39b

  • SHA512

    1ba9a2f4bc6552339078762acd52b59d2ed3798d49b6b5bf0615f3caa6a315103f3166e8941b94f6d5a01e06dfdd38363e1e6d1091fe046e1697589e57a79959

  • SSDEEP

    24576:7UA0Aa/NF9BpvbxxQO/Wh5ChSNF3PWjdCXpKO7Yq8EMHOS8NdOBG7QTOTzgZrkQ3:10xlbBpvHb/Wh5Xv3OjdKKOj8ErRNdu1

Malware Config

Extracted

Family

systembc

C2

5.42.65.67:4298

localhost.exchange:4298

Targets

    • Target

      e66dec71ef0ffbb33127f41b8ab1fe3e.exe

    • Size

      1.5MB

    • MD5

      e66dec71ef0ffbb33127f41b8ab1fe3e

    • SHA1

      719e12ef09b6e3ab747421946a57739a649cf483

    • SHA256

      240ff64b312acf203a1498a58801bf79ad99617e7dbf961c6a289531d1b7b39b

    • SHA512

      1ba9a2f4bc6552339078762acd52b59d2ed3798d49b6b5bf0615f3caa6a315103f3166e8941b94f6d5a01e06dfdd38363e1e6d1091fe046e1697589e57a79959

    • SSDEEP

      24576:7UA0Aa/NF9BpvbxxQO/Wh5ChSNF3PWjdCXpKO7Yq8EMHOS8NdOBG7QTOTzgZrkQ3:10xlbBpvHb/Wh5Xv3OjdKKOj8ErRNdu1

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks