MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 096565e7dba18a134a70a87f1bc7158f31007366958a3fa637ffc23085168275. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Simda


Vendor detections: 13


Intelligence 13 IOCs YARA 11 File information Comments

SHA256 hash: 096565e7dba18a134a70a87f1bc7158f31007366958a3fa637ffc23085168275
SHA3-384 hash: 8926ec75087070ddd430d610229759ffdd3309f99d54e39621d689ed2738f2b1c15353b412ffe6c67470d38b6ab42fdd
SHA1 hash: 7a17123c25329904a9cd56c8ab6e84dd874e4af6
MD5 hash: 07b1ba1f46b41cd0d0ed9dc6d6d0b135
humanhash: august-papa-ohio-hot
File name:svchost.exe
Download: download sample
Signature Simda
File size:593'468 bytes
First seen:2025-11-23 09:16:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 98aa7065495f35513795744857924eba (17 x Simda)
ssdeep 6144:St++Jbojf5Vq5OC4qZhZcKYhc/ZfUozYE:9+cff22qZhZcKYhc/5
TLSH T167C4123253088DE2D9120DB704F1974225E9E638D3F5C2876926098F796ABA37C7DF1E
TrID 30.2% (.EXE) Win64 Executable (generic) (10522/11/4)
18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
14.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.9% (.EXE) Win32 Executable (generic) (4504/4/1)
5.9% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter Hexastrike
Tags:exe Simda

Intelligence


File Origin
# of uploads :
1
# of downloads :
22
Origin country :
IE IE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
emotet simda shiz
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Creating a process from a recently created file
DNS request
Connection attempt
Sending an HTTP GET request
Sending a custom TCP request
Creating a file
Searching for the anti-virus window
Moving of the original file
Query of malicious DNS domain
Enabling autorun
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context crypt packed similar-threat
Result
Gathering data
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Infostealer.Simda
Status:
Malicious
First seen:
2025-11-21 16:07:23 UTC
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:simda discovery persistence stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Modifies WinLogon
Executes dropped EXE
Modifies WinLogon for persistence
Simda family
simda
Verdict:
Malicious
Tags:
Win.Dropper.Shiz-10025558-0
YARA:
n/a
Unpacked files
SH256 hash:
0b516f9ba0686aa0a6feebe88c5e740d24f840ab8d0a8b1f76b45e4e48353f68
MD5 hash:
147ed88aadc074ad5a01bddb0403ce5a
SHA1 hash:
eee5cf0a991458e1e34b194b40c32d5a4af3bd9a
Detections:
win_simda_auto win_simda_g1 win_simda_g0 Simda MALWARE_Win_Simda
SH256 hash:
2826dacdb14975648ca72341a1671a0ab8b2abf82612b4b2abe7920c49a8aece
MD5 hash:
6b42d26beb9772be80441e5e0dd7e12d
SHA1 hash:
07cea265210368b3eca62653ec23b0f5b0db0525
Detections:
win_simda_g0 win_simda_auto win_simda_g1 Simda MALWARE_Win_Simda
Parent samples :
7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b
d7db5171f51590f6eb1f7250eb75203b68ea0e9ba29a60457776338c5a9c9dc3
a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668
096565e7dba18a134a70a87f1bc7158f31007366958a3fa637ffc23085168275
097bd5475473d973ae87074af9b1b69a315c926d93a86fa48f89021b80610252
12c30a3047bd7ca6f04361d79c1a9a4105c8cd240baf09d9a191149dd944ba45
168ad18cfd1a72b60b43311145a51cc070a38ff0764fdd062b221bdee094d2fc
1958ad830c697392c00bd4ce5cd4c4344450ae70a04f5c117ada33507dc89ffa
1ff3b686268fb31afae4ff1347cf8a6246b2ff01dd6f51b2fd2b450437e7dbd1
2592990b0849e15d4de9d19ee6e5cfbf99a5dd04f64f233dd5c3aa95f49ecd8c
2ef62badb31a555ea89d953850b28c6ac0c3839eb11a0d48f6bfd9e4cc09a8fb
2f4045740d2e0ca3f5a49c0465a466888e85aec48055d6d38e687a1634f9a1ff
3b99d46e75073297874ddfe85ef87c3589aa65ffa9ce29abe4a23f115acbdc46
3f5c1eedcdf3887b5b400a144d15e1da1d231b3cd270c5bcf661b375e4a857ab
42e4b4f9e119dff9be5cf64f1243b37d0e38832c7fbbeec01aed8f15a61d95a9
536e70798dab08ea627c1b86a7ad8a4918d768a93de68dce01896ed4cffc9c6c
5f6b52e9ace72e85b26efc1947e4faf7d626e332d566549408ce3a7c08120339
5fbfbb3b756e899d2a5cbd53bb4dc4bb73758bd2b6ddaca123f667de1a9c0420
70dd0e2b0cade900551fd86f289d98416738c0fff4070b0f33dc700434e4b666
7b7facba08d67d7d0998d7416ff2e22e428de4c680b87217031f7167ca10fdb0
89971a4d4fb74a5b249004c462e1130716f900226aba8651ba69700a61c2096b
8ae793193707e379e7930d83ee07f42932835668c99d58c1a14db573e8762736
acbf1197865587755eba928323c83304bb69439d71f3f55836e4c51c1eb0160f
b28f6f96ccd229d069fde330a7a960c9fc7b7f60c2b43e6f9db4fadfa1cba070
b8f9bbc6c289911023115142fe3c66ee609b9d45aa10d5652240b3a29638ae43
c50adcfe1afa21d18b8ced2ab1873e6fda049adcb933e6f5c421c9c78f90761d
c54c78b0605b256c90ead23916267a4935f796d2837cbe4549130a1f2096c976
d8c98b51b8a34ea664aec1de873dac0d28491fa84f672c4b737594a7010f6343
e0aa628757ed96d02e2ed4ce43131f0ef390839d5deee079cd0b140ceb78de8c
SH256 hash:
c44fab97408f6c7a0c613d2f30774cbff93f3c06c4c1bf9003aaede6e65aed77
MD5 hash:
a5efdd23f9018f2c72bd14755a20fd9e
SHA1 hash:
e1fac00817755c26c377ea8537594b84a0f3c395
Detections:
win_simda_auto win_simda_g1 win_simda_g0 Simda MALWARE_Win_Simda
Parent samples :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 hash:
096565e7dba18a134a70a87f1bc7158f31007366958a3fa637ffc23085168275
MD5 hash:
07b1ba1f46b41cd0d0ed9dc6d6d0b135
SHA1 hash:
7a17123c25329904a9cd56c8ab6e84dd874e4af6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:MALWARE_Win_Simda
Author:ditekShen
Description:Detects Simda / Shifu infostealer
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Windows_Trojan_Zeus_e51c60d7
Author:Elastic Security
Description:Detects strings used in Zeus web injects. Many other malware families are built on Zeus and may hit on this signature.
Reference:https://www.virusbulletin.com/virusbulletin/2014/10/paper-evolution-webinjects
Rule name:win_simda_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.simda.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments