SystemBC

SystemBC is a malware family offered as a malware-as-a-service (MaaS) that is used to establish command and control and facilitate follow-on activity, including ransomware deployment.SystemBC executes a variety of tasks including setting up SOCKS5 proxies, maintaining persistence, ingesting malicious files, and handing C2 communication. SystemBC was first detected in 2018, and has been used by Wizard Spider since at least 2020, and by FIN7 since at least 2022.[1][2][3][4][5]

ID: S9001
Associated Software: Coroxy
Type: MALWARE
Platforms: Linux, Windows
Contributors: Serhii Melnyk; Stijn Geerts
Version: 1.0
Created: 15 December 2025
Last Modified: 23 April 2026

Associated Software Descriptions

Name Description
Coroxy

[3][6][7]

Techniques Used

Domain ID Name Use
Enterprise T1087 .001 Account Discovery: Local Account

SystemBC has collected the Windows account username on the victim machine.[2]

Enterprise T1071 .004 Application Layer Protocol: DNS

SystemBC has used DNS servers to resolve .bit domains to C2 infrastructure.[8]

Enterprise T1059 .001 Command and Scripting Interpreter: PowerShell

SystemBC has used hidden scheduled tasks to execute PowerShell commands by adding the following: -WindowStyle Hidden -ep bypass -file.[2]

.003 Command and Scripting Interpreter: Windows Command Shell

SystemBC has used cmd.exe to execute VBS scripts, BAT scripts and CMD scripts.[2]

.005 Command and Scripting Interpreter: Visual Basic

SystemBC has leveraged VBScript to execute malicious code.[2]

Enterprise T1001 Data Obfuscation

SystemBC has encoded with XOR and encrypted with RC4 its beacon.[5]

Enterprise T1678 Delay Execution

SystemBC has leveraged the Sleep functions before and after commands to ensure execution using the hexadecimal values within commands to include Sleep(0x2710u) that waits 10 seconds, and Sleep(0xEA60u) for 60 seconds.[2]

Enterprise T1140 Deobfuscate/Decode Files or Information

SystemBC has the ability to decrypt RC4 encrypted packets and to decode obfuscated data before C2 communication.[4] Additionally, SystemBC has decrypted its config file that was encoded with XOR and a hardcoded 40-byte key.[5]

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

SystemBC has encrypted its C2 traffic with RC4.[8][2]

Enterprise T1480 Execution Guardrails

SystemBC has checked if the last characters of DNS server names end in .bit before initializing C2 communication.[8] SystemBC has identified running processes associated with anti-virus solutions to include a2guard.exe to determine whether it executes or not.[2]

Enterprise T1564 .003 Hide Artifacts: Hidden Window

SystemBC has utilized the -WindowStyle Hidden -ep bypass -fileto conceal PowerShell windows.[2]

Enterprise T1105 Ingress Tool Transfer

SystemBC has downloaded additional files for execution on the victim’s machine.[2][1] The server component of SystemBC has the ability to send additional files to victim machines.[1]

Enterprise T1106 Native API

SystemBC has utilized native Windows API functions such as EnumWindowsand GetVolumeInformationA during discovery activities.[2]

Enterprise T1095 Non-Application Layer Protocol

SystemBC has used raw TCP on non-standard ports, such as 4044, for C2 communications and for HTTP communications, which include downloading binaries.[2][4]

Enterprise T1571 Non-Standard Port

The server component of SystemBC has used various TCP ports for C2 communication.[1]

Enterprise T1057 Process Discovery

SystemBC has the ability to enumerate running processes.[2]

Enterprise T1090 .003 Proxy: Multi-hop Proxy

SystemBC has used multiple proxy layers, such as SOCKS5 and Tor, for C2 communication.[8][2][1][3] SystemBC has also leveraged Tor for encrypting and concealing C2 traffic.[2] The server component of SystemBC has used SOCKS5 for C2 communication.[1]

Enterprise T1620 Reflective Code Loading

SystemBC has downloaded a text file into memory and set the area of memory via the VirtualProtect call. Then, SystemBC has executed the file via the CreateThread call.[1]

Enterprise T1053 .005 Scheduled Task/Job: Scheduled Task

SystemBC has executed a copy of itself as a scheduled task with the start command. The copy of SystemBC has random file and directory names within the ProgramData directory.[2][1]

Enterprise T1082 System Information Discovery

SystemBC has collected username , build number and serial number, then sent the information to the C2 server.[2][4] SystemBC has also gathered device name, operating system, and processor type.[8]

Enterprise T1124 System Time Discovery

SystemBC has leveraged the time of the device to create a text file with a filename that uses the function of uniqid(time()).‘.txt, consisting of the 10 character UNIX timestamp and 13 hexadecimal characters.[1]

Groups That Use This Software

References