MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da6a04e55e07cfd3c541c340e945c4dad38ac8d414d38dadd3f406f9c954652c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SystemBC


Vendor detections: 15


Intelligence 15 IOCs YARA 8 File information Comments

SHA256 hash: da6a04e55e07cfd3c541c340e945c4dad38ac8d414d38dadd3f406f9c954652c
SHA3-384 hash: a933d86acfda8756251c45ac6e9b692eee5e94342d0d59e3d7370435702a41753e90dda788844af744ce28a337894810
SHA1 hash: 3d20b1c6f93029ab557819efd1f32afc25ac1e88
MD5 hash: b950169921d1437cef4a85778cd81636
humanhash: berlin-quebec-ohio-aspen
File name:B950169921D1437CEF4A85778CD81636.dll
Download: download sample
Signature SystemBC
File size:30'736 bytes
First seen:2023-11-18 05:15:15 UTC
Last seen:2023-11-18 07:14:01 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 68a4d66732977014d6d8b63cdbe7534b (1 x SystemBC)
ssdeep 768:Ugj98hSEzIOxO+OZWBaFWsBC7wU6LPLoEf73Wud9BdoJrZmZEMb+:Z0IOxO+OZWBGWsB+w93L39BdoD
TLSH T142D2092A345492F1D69106B43F5FA3A089BE78324379B819EFE01F547BF59DBA706203
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:dll SystemBC


Avatar
abuse_ch
SystemBC C2:
37.220.86.73:4001

Intelligence


File Origin
# of uploads :
2
# of downloads :
330
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a TCP request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
coroxy crypto evasive greyware hacktool lolbin overlay shell32 systembc
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SystemBC
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SystemBC
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1344463 Sample: Dg7RDdyet9.dll Startdate: 18/11/2023 Architecture: WINDOWS Score: 92 19 Snort IDS alert for network traffic 2->19 21 Found malware configuration 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 4 other signatures 2->25 7 loaddll32.exe 1 2->7         started        process3 dnsIp4 17 37.220.86.73, 4001, 49729, 49730 ARTEM-CATV-ASRU Russian Federation 7->17 10 cmd.exe 1 7->10         started        12 conhost.exe 7->12         started        process5 process6 14 rundll32.exe 10->14         started        signatures7 27 System process connects to network (likely due to code injection or exploit) 14->27
Threat name:
Win32.Trojan.Coroxy
Status:
Malicious
First seen:
2023-11-12 08:21:56 UTC
File Type:
PE (Dll)
AV detection:
21 of 23 (91.30%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
systembc
Score:
  10/10
Tags:
family:systembc
Behaviour
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Malware Config
C2 Extraction:
37.220.86.73:4001
Unpacked files
SH256 hash:
da6a04e55e07cfd3c541c340e945c4dad38ac8d414d38dadd3f406f9c954652c
MD5 hash:
b950169921d1437cef4a85778cd81636
SHA1 hash:
3d20b1c6f93029ab557819efd1f32afc25ac1e88
Detections:
SystemBC win_systembc_auto win_systembc_g0 MiniTor
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:MiniTor
Author:@bartblaze
Description:Identifies MiniTor implementation as seen in SystemBC and Parallax RAT.
Reference:https://news.sophos.com/en-us/2020/12/16/systembc/
Rule name:Start2_net_mem
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:Start2_overlap_mem
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:Start2__mem
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:win_systembc_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.systembc.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments