Sysmain

Description

(Kaspersky) The autonomous part of Sysmain installs and registers itself to be persistent in the system. Then it gathers general information about the victims system, like • User- and computer names • Locale information • Network- and drive status • Default browsers • Running processes • File listing of the users profile directory.

When ready, this data is submitted to one of the C&C-servers. After that, it checks periodically for new commands from C&C (pulling via HTTP).

With a set of 11 commands, the malware is able to: • Execute shell-commands • Launch additional executables or libraries (sent by the attacker) • Collect arbitrary files for later exfiltration • Examine the victim’s filesystem.

There are also commands used for maintenance purposes. Among others, there are commands to change the pubkey for C&C-communication or delete its traces in the registry.

Names

Name
Sysmain

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Info stealer
  • Exfiltration

Information

Other Information

Uuid

0290ce40-4114-48ba-a170-d1c40ca57a7d

Last Card Change

2020-04-20