Sysmain
Description
(Kaspersky) The autonomous part of Sysmain installs and registers itself to be persistent in the system. Then it gathers general information about the victims system, like • User- and computer names • Locale information • Network- and drive status • Default browsers • Running processes • File listing of the users profile directory.
When ready, this data is submitted to one of the C&C-servers. After that, it checks periodically for new commands from C&C (pulling via HTTP).
With a set of 11 commands, the malware is able to: • Execute shell-commands • Launch additional executables or libraries (sent by the attacker) • Collect arbitrary files for later exfiltration • Examine the victim’s filesystem.
There are also commands used for maintenance purposes. Among others, there are commands to change the pubkey for C&C-communication or delete its traces in the registry.
Names
Name |
---|
Sysmain |
Category
Malware
Type
- Reconnaissance
- Backdoor
- Info stealer
- Exfiltration
Information
Other Information
Uuid
0290ce40-4114-48ba-a170-d1c40ca57a7d
Last Card Change
2020-04-20