Related Families: RIG, Fallout EK
Executive Summary
SystemBC, a RAT that previously only targeted Windows systems was recently observed targeting Linux.
Key Takeaways
- SystemBC, a RAT that previously only targeted Windows systems was recently observed targeting Linux.
- SystemBC is typically delivered via phishing emails or via exploit kits, such as RIG and Fallout EK.
- Recent updates to SystemBC have made it more stealthy and harder to detect.
- PolySwarm analysts consider SystemBC to be an evolving threat.
What is SystemBC?
SystemBC, a RAT that previously only targeted Windows systems, was recently observed targeting Linux. HackRead reported on this activity.
SystemBC is a remote access trojan (RAT) written in C. It has been active since at least 2018. SystemBC, which turns infected machines into SOCKS5 proxies, is typically delivered via phishing emails or via exploit kits, such as RIG and Fallout EK. It is rarely the only malware deployed on a victim machine, often used in conjunction with other malware such as ransomware, banking trojans, crypto miners, and infostealers.
The malware’s features include the following:
- SOCKS5 Proxy Functionality: Allows threat actors to route traffic through infected hosts to evade network detection.
- Remote Access Capabilities: Enables threat actors to control compromised machines remotely.
- Persistence Mechanisms: Uses various techniques to maintain a foothold on infected systems.
- Modular Design: Can be updated with additional payloads to suit the attacker’s needs.
- C2 Communications: Uses encrypted communication channels to communicate with command-and-control servers.
Recent updates to SystemBC have made it more stealthy and harder to detect. SystemBC is capable of signature-based detection evasion and can detect the presence of virtualized environments. If a virtual environment is detected, the malware can alter its behavior or terminate execution, making analysis more difficult.
SystemBC has been used in conjunction with high-profile ransomware operations in the past, helping threat actors maintain access to victim networks before executing ransomware payloads. It has also been observed in the hands of initial access brokers who sell entry points to other cybercriminals. The ability to target Linux systems makes SystemBC a threat to enterprise networks large and small. PolySwarm analysts consider SystemBC to be an evolving threat.
IOCs
PolySwarm has multiple samples of SystemBC.
c340e3d3ae7f769b4e88204dd08aa0f7b0145dffafe164d8e09c39b5a6d0d7cb
2a7e13e904f8de0f4eebe3d364f7f1fdd09aa72b2c95db20393cfbb0eb77341d
e39086a052eb2a30199c4badd5954720a4da2beb14d750bb9a15749f52e1cd69
de1091252ebf2ed617e300c40a2c56ccac8a3e1b5c7f0e87a1cc3636766abe51
You can use the following CLI command to search for all SystemBC samples in our portal:
$ polyswarm link list -f SystemBC
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.