MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 53dc38f328d2663c7b8cfd06bc984b4b1912d86dd5e61a3164183f1507f928da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mofksys


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: 53dc38f328d2663c7b8cfd06bc984b4b1912d86dd5e61a3164183f1507f928da
SHA3-384 hash: f6f62fcf15cc7826dbb05e482322f0572c1c4c62cc0cc0cea6f268be89519ed6c41c147703e72c4831286461eca5fe14
SHA1 hash: 738a16a01cdd898d707f5ad366da8858ab893a18
MD5 hash: f7f3d059ccfcc21d9c99aa23cbdf95db
humanhash: two-cola-oranges-harry
File name:install-interception.exe
Download: download sample
Signature Mofksys
File size:608'958 bytes
First seen:2025-06-06 20:16:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8c16c795b57934183422be5f6df7d891 (36 x Mofksys, 18 x CryptOne, 6 x AveMariaRAT)
ssdeep 6144:UsLqdufVUNDalsglhAWORQG8O1dMDmJPjQy4xZWLUKc2/:PFUNDals4LjGvMk74+BR
Threatray 39 similar samples on MalwareBazaar
TLSH T1DCD47D031F54946BCA6647B450FA872ABB75FAA11B619F8F123193242E537C27B3831F
TrID 42.6% (.EXE) Win32 Executable (generic) (4504/4/1)
19.4% (.ICL) Windows Icons Library (generic) (2059/9)
18.9% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon 00928e8e8686b800 (21 x Mofksys, 9 x CryptOne, 5 x Amadey)
Reporter Anonymous
Tags:exe Mofksys

Intelligence


File Origin
# of uploads :
1
# of downloads :
429
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Mystic Fn.7z
Verdict:
Malicious activity
Analysis date:
2025-06-06 19:46:37 UTC
Tags:
arch-exec jeefo iqvw64e-sys vuln-driver

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
trojware dropper swisyn spawn
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Creating a file in the Windows subdirectories
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Enabling the 'hidden' option for recently created files
Setting a single autorun event
Enabling a "Do not show hidden files" option
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm overlay overlay packed packer_detected visual_basic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne, Mofksys
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Detected CryptOne packer
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected Mofksys
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1708552 Sample: install-interception.exe Startdate: 06/06/2025 Architecture: WINDOWS Score: 100 64 googlecode.l.googleusercontent.com 2->64 66 codecmd03.googlecode.com 2->66 68 2 other IPs or domains 2->68 84 Antivirus / Scanner detection for submitted sample 2->84 86 Multi AV Scanner detection for submitted file 2->86 88 Yara detected Mofksys 2->88 90 5 other signatures 2->90 11 install-interception.exe 1 3 2->11         started        15 svchost.exe 2->15 injected 17 svchost.exe 2->17         started        19 6 other processes 2->19 signatures3 process4 dnsIp5 58 C:\Windows\Resources\Themes\icsys.icn.exe, MS-DOS 11->58 dropped 60 C:\Users\user\...\install-interception.exe, PE32 11->60 dropped 106 Drops executables to the windows directory (C:\Windows) and starts them 11->106 22 icsys.icn.exe 3 11->22         started        26 install-interception.exe 1 11->26         started        108 Injects code into the Windows Explorer (explorer.exe) 15->108 28 consent.exe 15->28         started        30 explorer.exe 15->30         started        32 svchost.exe 15->32         started        110 Changes security center settings (notifications, updates, antivirus, firewall) 17->110 34 MpCmdRun.exe 17->34         started        70 127.0.0.1 unknown unknown 19->70 file6 signatures7 process8 file9 56 C:\Windows\Resources\Themes\explorer.exe, MS-DOS 22->56 dropped 100 Antivirus detection for dropped file 22->100 102 Drops PE files with benign system names 22->102 36 explorer.exe 15 22->36         started        41 conhost.exe 26->41         started        104 Writes to foreign memory regions 28->104 43 conhost.exe 34->43         started        signatures10 process11 dnsIp12 72 googlecode.l.googleusercontent.com 142.251.116.82, 49717, 49721, 49722 GOOGLEUS United States 36->72 74 142.251.186.82, 49719, 49725, 49729 GOOGLEUS United States 36->74 54 C:\Windows\Resources\spoolsv.exe, MS-DOS 36->54 dropped 92 Antivirus detection for dropped file 36->92 94 System process connects to network (likely due to code injection or exploit) 36->94 96 Multi AV Scanner detection for dropped file 36->96 98 Drops PE files with benign system names 36->98 45 spoolsv.exe 3 36->45         started        file13 signatures14 process15 file16 62 C:\Windows\Resources\svchost.exe, MS-DOS 45->62 dropped 112 Antivirus detection for dropped file 45->112 114 Multi AV Scanner detection for dropped file 45->114 116 Drops PE files with benign system names 45->116 49 svchost.exe 2 2 45->49         started        signatures17 process18 signatures19 76 Antivirus detection for dropped file 49->76 78 Multi AV Scanner detection for dropped file 49->78 80 Detected CryptOne packer 49->80 82 Drops executables to the windows directory (C:\Windows) and starts them 49->82 52 spoolsv.exe 1 49->52         started        process20
Threat name:
Win32.Trojan.Golsys
Status:
Malicious
First seen:
2025-06-06 20:11:46 UTC
File Type:
PE (Exe)
Extracted files:
24
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion discovery persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Executes dropped EXE
Modifies visiblity of hidden/system files in Explorer
Verdict:
Malicious
Tags:
trojan Win.Trojan.VBGeneric-6735875-0
YARA:
Windows_Generic_Threat_7526f106 Windows_Generic_Threat_cbe3313a
Unpacked files
SH256 hash:
53dc38f328d2663c7b8cfd06bc984b4b1912d86dd5e61a3164183f1507f928da
MD5 hash:
f7f3d059ccfcc21d9c99aa23cbdf95db
SHA1 hash:
738a16a01cdd898d707f5ad366da8858ab893a18
SH256 hash:
49cc035887b111838bacae9c763b934fe3d8015da18e95bc51499313944f6c55
MD5 hash:
b8b584e3a84efd02aeb5b0d7ea1cd8e0
SHA1 hash:
8e12fae13b298661308371e69c1a1a7bc08748bb
SH256 hash:
2d5e418aac76968d8aa792b847bf72b8ab3b5b0beebf8d9fd169328f95decbe1
MD5 hash:
11e2ddee4e43ed149811b18a165f5eb8
SHA1 hash:
06d9e144cf5d3f3f96ce02c8983b869d293cb399
SH256 hash:
ba219ef5c872b99f95467396722ffc8e5236dfb1230f68e93917cb0e24b09441
MD5 hash:
2ae720c59177a29b5b26d66bbafad219
SHA1 hash:
151f6b1b3b67a59cc924537a14ff6bfe27ed0ec0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SUSP_Imphash_Mar23_2
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal)
Reference:Internal Research
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Generic_Threat_7526f106
Author:Elastic Security
Rule name:Windows_Generic_Threat_cbe3313a
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaCopyBytes
MSVBVM60.DLL::__vbaSetSystemError
MSVBVM60.DLL::__vbaExitProc
MSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef
MSVBVM60.DLL::__vbaFileOpen

Comments