ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool Sysmain

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Sysmain

NamesSysmain
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(Kaspersky) The autonomous part of Sysmain installs and registers itself to be persistent in the system. Then it gathers general information about the victims system, like
• User- and computer names
• Locale information
• Network- and drive status
• Default browsers
• Running processes
• File listing of the users profile directory.

When ready, this data is submitted to one of the C&C-servers. After that, it checks periodically for new commands from C&C (pulling via HTTP).

With a set of 11 commands, the malware is able to:
• Execute shell-commands
• Launch additional executables or libraries (sent by the attacker)
• Collect arbitrary files for later exfiltration
• Examine the victim’s filesystem.

There are also commands used for maintenance purposes. Among others, there are commands to change the pubkey for C&C-communication or delete its traces in the registry.
Information<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08080817/EB-YetiJuly2014-Public.pdf>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

Previous: SysKit
Next: SysUpdate

All groups using tool Sysmain

ChangedNameCountryObserved

APT groups

XEnergetic Bear, DragonflyRussia2010-Oct 2020 HOTX

1 group listed (1 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key