MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Simda


Vendor detections: 17


Intelligence 17 IOCs YARA File information Comments

SHA256 hash: 7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b
SHA3-384 hash: 26ee9095e3086f530070b9c35985ee087a50caf6bc33ec4eecade00aea19f5418900e7ed308a8794bb771ba0bf801d5f
SHA1 hash: 2caf9f151b88a328475181b2ecce22f90694795f
MD5 hash: bb4d08026f4dad460862be3d65fbeddb
humanhash: alabama-july-echo-hamper
File name:2caf9f151b88a328475181b2ecce22f90694795f.exe
Download: download sample
Signature Simda
File size:210'432 bytes
First seen:2024-11-11 16:50:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 616d060f84174fbe550615d295f4ce51 (7 x Simda)
ssdeep 3072:m7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:szHnMLm5GNGxHUhtnkdpHqTKzhh8i
Threatray 22 similar samples on MalwareBazaar
TLSH T133241206B59B418AC90A19B384FF77142BA87DDD1322D33F4E745EFA2CD60A93872984
TrID 30.2% (.EXE) Win64 Executable (generic) (10522/11/4)
18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
14.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.9% (.EXE) Win32 Executable (generic) (4504/4/1)
5.9% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
File icon (PE):PE icon
dhash icon 0000000000000102 (12 x Simda)
Reporter NDA0E
Tags:exe Simda

Intelligence


File Origin
# of uploads :
1
# of downloads :
350
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2caf9f151b88a328475181b2ecce22f90694795f.exe
Verdict:
Malicious activity
Analysis date:
2024-11-11 17:44:55 UTC
Tags:
sinkhole

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
emotet simda shiz
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Creating a process from a recently created file
DNS request
Connection attempt
Sending an HTTP GET request
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Sending a custom TCP request
Searching for the anti-virus window
Moving of the original file
Query of malicious DNS domain
Enabling autorun
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed packed packer_detected
Result
Threat name:
Simda Stealer
Detection:
malicious
Classification:
bank.troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Checks if browser processes are running
Contains functionality to behave differently if execute on a Russian/Kazak computer
Contains functionality to capture and log keystrokes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sandboxes (registry SystemBiosVersion/Date)
Contains functionality to infect the boot sector
Contains functionality to inject threads in other processes
Contains VNC / remote desktop functionality (version string found)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking volume information)
Found evasive API chain checking for user administrative privileges
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Moves itself to temp directory
Multi AV Scanner detection for submitted file
Queries Google from non browser process on port 80
Queries random domain names (often used to prevent blacklisting and sinkholes)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Simda Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1553823 Sample: WlCVLbzNph.exe Startdate: 11/11/2024 Architecture: WINDOWS Score: 100 38 vowyzuf.com 2->38 40 vowymom.com 2->40 42 1010 other IPs or domains 2->42 56 Suricata IDS alerts for network traffic 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 Antivirus detection for URL or domain 2->60 62 18 other signatures 2->62 9 WlCVLbzNph.exe 2 3 2->9         started        signatures3 process4 file5 34 C:\Windows\apppatch\svchost.exe, PE32 9->34 dropped 36 C:\Windows\...\svchost.exe:Zone.Identifier, ASCII 9->36 dropped 64 Detected unpacking (changes PE section rights) 9->64 66 Detected unpacking (overwrites its own PE header) 9->66 68 Moves itself to temp directory 9->68 70 8 other signatures 9->70 13 svchost.exe 2 110 9->13         started        signatures6 process7 dnsIp8 44 vopyret.com 13->44 46 vocyjic.com 13->46 48 28 other IPs or domains 13->48 72 System process connects to network (likely due to code injection or exploit) 13->72 74 Detected unpacking (changes PE section rights) 13->74 76 Detected unpacking (overwrites its own PE header) 13->76 78 16 other signatures 13->78 17 nPtwtzGyOdAtB.exe 13->17 injected 20 nPtwtzGyOdAtB.exe 13->20 injected 22 nPtwtzGyOdAtB.exe 13->22 injected 24 10 other processes 13->24 signatures9 process10 signatures11 50 Monitors registry run keys for changes 17->50 52 Contains VNC / remote desktop functionality (version string found) 17->52 54 Found direct / indirect Syscall (likely to bypass EDR) 17->54 26 WerFault.exe 21 24->26         started        28 WerFault.exe 24->28         started        30 WerFault.exe 24->30         started        32 4 other processes 24->32 process12
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2024-11-11 09:27:39 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:simda discovery persistence stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Modifies WinLogon
Executes dropped EXE
Loads dropped DLL
Modifies WinLogon for persistence
Simda family
simda
Verdict:
Malicious
Tags:
Win.Trojan.Agent-316146
YARA:
n/a
Unpacked files
SH256 hash:
c44fab97408f6c7a0c613d2f30774cbff93f3c06c4c1bf9003aaede6e65aed77
MD5 hash:
a5efdd23f9018f2c72bd14755a20fd9e
SHA1 hash:
e1fac00817755c26c377ea8537594b84a0f3c395
Detections:
Simda win_simda_auto win_simda_g0 win_simda_g1 MALWARE_Win_Simda
Parent samples :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 hash:
2826dacdb14975648ca72341a1671a0ab8b2abf82612b4b2abe7920c49a8aece
MD5 hash:
6b42d26beb9772be80441e5e0dd7e12d
SHA1 hash:
07cea265210368b3eca62653ec23b0f5b0db0525
Detections:
Simda win_simda_auto win_simda_g0 win_simda_g1 MALWARE_Win_Simda
Parent samples :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 hash:
ce14e6d2bd2b3ddc612b39045df1060506e3613d667f54ef9a11d389841a7fc8
MD5 hash:
4b8712874c21ef9717ecc33a7d4b330b
SHA1 hash:
022fcef7718c963529501917fd0b7bb35e474c21
Detections:
Simda win_simda_auto win_simda_g0 win_simda_g1 MALWARE_Win_Simda
SH256 hash:
7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b
MD5 hash:
bb4d08026f4dad460862be3d65fbeddb
SHA1 hash:
2caf9f151b88a328475181b2ecce22f90694795f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::GetVolumeInformationA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CopyFileExW
kernel32.dll::CopyFileExA
kernel32.dll::CreateFileMappingW
kernel32.dll::CreateFileA
kernel32.dll::RemoveDirectoryW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.DLL::RegCreateKeyW
ADVAPI32.DLL::RegCreateKeyExA
ADVAPI32.DLL::RegQueryValueA
ADVAPI32.DLL::RegReplaceKeyA
ADVAPI32.DLL::RegReplaceKeyW
WIN_USER_APIPerforms GUI ActionsUSER32.DLL::PeekMessageW

Comments