In the past 24 months, many threat actors have begun to pivot from the saturation of Windows endpoints to a more focused targeting of Linux-based enterprise infrastructure. A recent example of this is the malware family SystemBC, which was originally discovered in 2019 as a Windows proxy bot. Recently, a new Linux variant of SystemBC has been discovered.
How It Works
SystemBC functions primarily as a SOCKS5 proxy, converting infected machines into relay nodes that allow attackers to tunnel malicious traffic into and out of compromised networks. The primary suspected users of this functionality are RaaS groups such as Akira, BlackBasta, and Qilin.
The ELF variant of SystemBC is a direct port of the original C/C++ codebase found in Windows samples, and recompiled for the Linux environment. This enables attackers to infect a wide range of architectures, including x86, x64, and potentially ARM-based IOT devices. The malware generally takes the following path:
- In most campaigns, the infection starts with a compromise of a Linux server either through vulnerabilities or weak credentials. Once access is established, the SystemBC payload is delivered.
- In many cases, the malware is not dropped directly but is instead retrieved by an intermediate shell script.
- To evade detection, the ELF binary is frequently renamed to mimic legitimate system processes such as
monitor,sysdr,rsyslogd, orkworker.
- Upon execution, the ELF binary initializes by decrypting its embedded configuration block containing C2 domains and communication parameters.
- The configuration data is obfuscated using a hardcoded 40-byte XOR key.
- Once the C2 address has been resolved, an initial “beacon” packet is sent to register the victim machine within the botnet. This packet comprises of the 40-byte XOR key, followed by 10 bytes of patting, and finally an encrypted payload containing a marker (typically
0xffff), which is in turn followed by 48 bytes.
- SystemBC then employs a multi-layered encryption scheme for its network traffic that is designed to bypass NIDS systems that rely on entropy analysis or protocol fingerprinting. The encryption routine is as follows:
- First Pass (XOR): The raw payload is XORed with the session key.
- Encryption (RC4): The result of this first pass is encrypted using the RC4 stream cipher, keyed with the same session key.
- Final Pass (XOR): The cipertext is XORed again with the key.
- For an attacker to utilize the back-connect architecture:
- The infected Linux server initiates an outbound connection to the C2, either through port 80 or 443 (used for HTTP and HTTPS, respectively).
- Once connected, the bot keeps the socket open and sends periodic keep-alive beacons.
- When a threat actor wants to access the victim’s internal network, they connect to the C2 server, which bridges the attacker’s connection with the bot’s active session.
- Malicious traffic, such as RDP login attempts, SMB file transfers, or shell commands- is encapsulated in the SystemBC protocol, sent to the bot, decapsulated, and forwarded to the internal target.
- From here, SystemBC attempts to maintain persistence.
- Since the malware is usually installed as a
systemsdservice. It creates unit files that define the malware as a critical service, generally with theRestart=alwaysdirective. This ensures that the server OS automatically restarts the malware if it crashes or is shut down.
- Since the malware is usually installed as a
You can view a sandbox detonation of the Linux variant of SystemBC here.
Why It Matters
Migration to Linux targets, which often hold lower levels of protection than Windows workstations running EDR solutions, demonstrates shifting interest from the malware developers and the RaaS organizations that employ their offerings. However, we think that this trend is more about following the pivot from Windows Domain Controllers to Linux-based instances hosted in the cloud.
IOCs
| Hash | Variant Type | Description/Filename |
| 1c74b1195250632f2f1d1a9066f07f6e0a8c12dff40aeb3c1fe22440c97bc8ee | ELF Binary | Core SystemBC Linux sample analyzed by Lumen. Decrypts 40-byte XOR config. |
| 74a33138ce1e57564baa4ea4db4a882d6bf51081b79a167a6cb2bf9130ddad7f | ELF Binary | Sample masquerading as monitor. Linked to BlackBasta campaigns. |
| 7ccff87db7b4e6bc8c5a7e570f83e26ccb6f3a8f72388210af466048d3793b00 | ELF Binary | Sample masquerading as monitor. |
| c340e3d3ae7f769b4e88204dd08aa0f7b0145dffafe164d8e09c39b5a6d0d7cb | ELF Binary | Known SystemBC hash associated with Linux targeting. |
| 2a7e13e904f8de0f4eebe3d364f7f1fdd09aa72b2c95db20393cfbb0eb77341d | ELF Binary | Known SystemBC hash associated with Linux targeting. |
| Indicator Value | Type | Context/Role |
| 104.250.164[.]214 | IPv4 | Malware host and attack source. |
| 185.25.48[.]97 | IPv4 | C2 & REM proxy node. |
| honipsiops[.]in | Domain | Screening domain. |
| BTHoster | Provider | Bulletproof Hosting, primary host. |
| AS213790 | ASN | BulletProof Network, hosting infrastructure |
Leave a comment