MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Simda
Vendor detections: 17
| SHA256 hash: | 7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b |
|---|---|
| SHA3-384 hash: | 26ee9095e3086f530070b9c35985ee087a50caf6bc33ec4eecade00aea19f5418900e7ed308a8794bb771ba0bf801d5f |
| SHA1 hash: | 2caf9f151b88a328475181b2ecce22f90694795f |
| MD5 hash: | bb4d08026f4dad460862be3d65fbeddb |
| humanhash: | alabama-july-echo-hamper |
| File name: | 2caf9f151b88a328475181b2ecce22f90694795f.exe |
| Download: | download sample |
| Signature | Simda |
| File size: | 210'432 bytes |
| First seen: | 2024-11-11 16:50:16 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 616d060f84174fbe550615d295f4ce51 (7 x Simda) |
| ssdeep | 3072:m7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:szHnMLm5GNGxHUhtnkdpHqTKzhh8i |
| Threatray | 22 similar samples on MalwareBazaar |
| TLSH | T133241206B59B418AC90A19B384FF77142BA87DDD1322D33F4E745EFA2CD60A93872984 |
| TrID | 30.2% (.EXE) Win64 Executable (generic) (10522/11/4) 18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 14.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 12.9% (.EXE) Win32 Executable (generic) (4504/4/1) 5.9% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 0000000000000102 (12 x Simda) |
| Reporter | |
| Tags: | exe Simda |
Intelligence
File Origin
# of uploads :
1
# of downloads :
350
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2caf9f151b88a328475181b2ecce22f90694795f.exe
Verdict:
Malicious activity
Analysis date:
2024-11-11 17:44:55 UTC
Tags:
sinkhole
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
99.1%
Tags:
emotet simda shiz
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Creating a process from a recently created file
DNS request
Connection attempt
Sending an HTTP GET request
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Sending a custom TCP request
Searching for the anti-virus window
Moving of the original file
Query of malicious DNS domain
Enabling autorun
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
packed packed packer_detected
Verdict:
Malicious
Labled as:
Trojan.EmotetU.Generic
Malware family:
Simda
Verdict:
Malicious
Result
Threat name:
Simda Stealer
Detection:
malicious
Classification:
bank.troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Checks if browser processes are running
Contains functionality to behave differently if execute on a Russian/Kazak computer
Contains functionality to capture and log keystrokes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sandboxes (registry SystemBiosVersion/Date)
Contains functionality to infect the boot sector
Contains functionality to inject threads in other processes
Contains VNC / remote desktop functionality (version string found)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking volume information)
Found evasive API chain checking for user administrative privileges
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Moves itself to temp directory
Multi AV Scanner detection for submitted file
Queries Google from non browser process on port 80
Queries random domain names (often used to prevent blacklisting and sinkholes)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Simda Stealer
Behaviour
Behavior Graph:
Score:
99%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2024-11-11 09:27:39 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 24 (91.67%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
simda
Similar samples:
+ 12 additional samples on MalwareBazaar
Result
Malware family:
simda
Score:
10/10
Tags:
family:simda discovery persistence stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Modifies WinLogon
Executes dropped EXE
Loads dropped DLL
Modifies WinLogon for persistence
Simda family
simda
Verdict:
Malicious
Tags:
Win.Trojan.Agent-316146
YARA:
n/a
Unpacked files
SH256 hash:
c44fab97408f6c7a0c613d2f30774cbff93f3c06c4c1bf9003aaede6e65aed77
MD5 hash:
a5efdd23f9018f2c72bd14755a20fd9e
SHA1 hash:
e1fac00817755c26c377ea8537594b84a0f3c395
Detections:
Simda
win_simda_auto
win_simda_g0
win_simda_g1
MALWARE_Win_Simda
Parent samples :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 hash:
2826dacdb14975648ca72341a1671a0ab8b2abf82612b4b2abe7920c49a8aece
MD5 hash:
6b42d26beb9772be80441e5e0dd7e12d
SHA1 hash:
07cea265210368b3eca62653ec23b0f5b0db0525
Detections:
Simda
win_simda_auto
win_simda_g0
win_simda_g1
MALWARE_Win_Simda
Parent samples :
7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b
d7db5171f51590f6eb1f7250eb75203b68ea0e9ba29a60457776338c5a9c9dc3
a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668
096565e7dba18a134a70a87f1bc7158f31007366958a3fa637ffc23085168275
097bd5475473d973ae87074af9b1b69a315c926d93a86fa48f89021b80610252
12c30a3047bd7ca6f04361d79c1a9a4105c8cd240baf09d9a191149dd944ba45
168ad18cfd1a72b60b43311145a51cc070a38ff0764fdd062b221bdee094d2fc
1958ad830c697392c00bd4ce5cd4c4344450ae70a04f5c117ada33507dc89ffa
1ff3b686268fb31afae4ff1347cf8a6246b2ff01dd6f51b2fd2b450437e7dbd1
2592990b0849e15d4de9d19ee6e5cfbf99a5dd04f64f233dd5c3aa95f49ecd8c
2ef62badb31a555ea89d953850b28c6ac0c3839eb11a0d48f6bfd9e4cc09a8fb
2f4045740d2e0ca3f5a49c0465a466888e85aec48055d6d38e687a1634f9a1ff
3b99d46e75073297874ddfe85ef87c3589aa65ffa9ce29abe4a23f115acbdc46
3f5c1eedcdf3887b5b400a144d15e1da1d231b3cd270c5bcf661b375e4a857ab
42e4b4f9e119dff9be5cf64f1243b37d0e38832c7fbbeec01aed8f15a61d95a9
536e70798dab08ea627c1b86a7ad8a4918d768a93de68dce01896ed4cffc9c6c
5f6b52e9ace72e85b26efc1947e4faf7d626e332d566549408ce3a7c08120339
5fbfbb3b756e899d2a5cbd53bb4dc4bb73758bd2b6ddaca123f667de1a9c0420
70dd0e2b0cade900551fd86f289d98416738c0fff4070b0f33dc700434e4b666
7b7facba08d67d7d0998d7416ff2e22e428de4c680b87217031f7167ca10fdb0
89971a4d4fb74a5b249004c462e1130716f900226aba8651ba69700a61c2096b
8ae793193707e379e7930d83ee07f42932835668c99d58c1a14db573e8762736
acbf1197865587755eba928323c83304bb69439d71f3f55836e4c51c1eb0160f
b28f6f96ccd229d069fde330a7a960c9fc7b7f60c2b43e6f9db4fadfa1cba070
b8f9bbc6c289911023115142fe3c66ee609b9d45aa10d5652240b3a29638ae43
c50adcfe1afa21d18b8ced2ab1873e6fda049adcb933e6f5c421c9c78f90761d
c54c78b0605b256c90ead23916267a4935f796d2837cbe4549130a1f2096c976
d8c98b51b8a34ea664aec1de873dac0d28491fa84f672c4b737594a7010f6343
e0aa628757ed96d02e2ed4ce43131f0ef390839d5deee079cd0b140ceb78de8c
d7db5171f51590f6eb1f7250eb75203b68ea0e9ba29a60457776338c5a9c9dc3
a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668
096565e7dba18a134a70a87f1bc7158f31007366958a3fa637ffc23085168275
097bd5475473d973ae87074af9b1b69a315c926d93a86fa48f89021b80610252
12c30a3047bd7ca6f04361d79c1a9a4105c8cd240baf09d9a191149dd944ba45
168ad18cfd1a72b60b43311145a51cc070a38ff0764fdd062b221bdee094d2fc
1958ad830c697392c00bd4ce5cd4c4344450ae70a04f5c117ada33507dc89ffa
1ff3b686268fb31afae4ff1347cf8a6246b2ff01dd6f51b2fd2b450437e7dbd1
2592990b0849e15d4de9d19ee6e5cfbf99a5dd04f64f233dd5c3aa95f49ecd8c
2ef62badb31a555ea89d953850b28c6ac0c3839eb11a0d48f6bfd9e4cc09a8fb
2f4045740d2e0ca3f5a49c0465a466888e85aec48055d6d38e687a1634f9a1ff
3b99d46e75073297874ddfe85ef87c3589aa65ffa9ce29abe4a23f115acbdc46
3f5c1eedcdf3887b5b400a144d15e1da1d231b3cd270c5bcf661b375e4a857ab
42e4b4f9e119dff9be5cf64f1243b37d0e38832c7fbbeec01aed8f15a61d95a9
536e70798dab08ea627c1b86a7ad8a4918d768a93de68dce01896ed4cffc9c6c
5f6b52e9ace72e85b26efc1947e4faf7d626e332d566549408ce3a7c08120339
5fbfbb3b756e899d2a5cbd53bb4dc4bb73758bd2b6ddaca123f667de1a9c0420
70dd0e2b0cade900551fd86f289d98416738c0fff4070b0f33dc700434e4b666
7b7facba08d67d7d0998d7416ff2e22e428de4c680b87217031f7167ca10fdb0
89971a4d4fb74a5b249004c462e1130716f900226aba8651ba69700a61c2096b
8ae793193707e379e7930d83ee07f42932835668c99d58c1a14db573e8762736
acbf1197865587755eba928323c83304bb69439d71f3f55836e4c51c1eb0160f
b28f6f96ccd229d069fde330a7a960c9fc7b7f60c2b43e6f9db4fadfa1cba070
b8f9bbc6c289911023115142fe3c66ee609b9d45aa10d5652240b3a29638ae43
c50adcfe1afa21d18b8ced2ab1873e6fda049adcb933e6f5c421c9c78f90761d
c54c78b0605b256c90ead23916267a4935f796d2837cbe4549130a1f2096c976
d8c98b51b8a34ea664aec1de873dac0d28491fa84f672c4b737594a7010f6343
e0aa628757ed96d02e2ed4ce43131f0ef390839d5deee079cd0b140ceb78de8c
SH256 hash:
ce14e6d2bd2b3ddc612b39045df1060506e3613d667f54ef9a11d389841a7fc8
MD5 hash:
4b8712874c21ef9717ecc33a7d4b330b
SHA1 hash:
022fcef7718c963529501917fd0b7bb35e474c21
Detections:
Simda
win_simda_auto
win_simda_g0
win_simda_g1
MALWARE_Win_Simda
SH256 hash:
7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b
MD5 hash:
bb4d08026f4dad460862be3d65fbeddb
SHA1 hash:
2caf9f151b88a328475181b2ecce22f90694795f
Malware family:
Shifu
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | kernel32.dll::GetVolumeInformationA |
| WIN_BASE_IO_API | Can Create Files | kernel32.dll::CopyFileExW kernel32.dll::CopyFileExA kernel32.dll::CreateFileMappingW kernel32.dll::CreateFileA kernel32.dll::RemoveDirectoryW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.DLL::RegCreateKeyW ADVAPI32.DLL::RegCreateKeyExA ADVAPI32.DLL::RegQueryValueA ADVAPI32.DLL::RegReplaceKeyA ADVAPI32.DLL::RegReplaceKeyW |
| WIN_USER_API | Performs GUI Actions | USER32.DLL::PeekMessageW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.