General

  • Target

    dfcabb4fe83a48168317bb52644582af_JaffaCakes118

  • Size

    209KB

  • Sample

    240914-jzj1fstfql

  • MD5

    dfcabb4fe83a48168317bb52644582af

  • SHA1

    b75212a72147b16ab2a4c6057bdb4c034bc0533d

  • SHA256

    374dfac7378794f1b4a2b8595944fdff10d5a6cb14b0053c756ad4ca43184518

  • SHA512

    936e08e7068f75239713523f8300c5ad1fe231a8ea234404169aa91a37cc4aaf04f85bf65a34a86120bd73e6021868b1cd8ec46e5a101a9d149950fa6d0872e4

  • SSDEEP

    6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U4:cnLh9yn52rpUR5vHuRYpM+4

Malware Config

Extracted

Family

systembc

C2

yan0212.com:4039

yan0212.net:4039

Targets

    • Target

      dfcabb4fe83a48168317bb52644582af_JaffaCakes118

    • Size

      209KB

    • MD5

      dfcabb4fe83a48168317bb52644582af

    • SHA1

      b75212a72147b16ab2a4c6057bdb4c034bc0533d

    • SHA256

      374dfac7378794f1b4a2b8595944fdff10d5a6cb14b0053c756ad4ca43184518

    • SHA512

      936e08e7068f75239713523f8300c5ad1fe231a8ea234404169aa91a37cc4aaf04f85bf65a34a86120bd73e6021868b1cd8ec46e5a101a9d149950fa6d0872e4

    • SSDEEP

      6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U4:cnLh9yn52rpUR5vHuRYpM+4

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Enterprise v15

Tasks