MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b28f6f96ccd229d069fde330a7a960c9fc7b7f60c2b43e6f9db4fadfa1cba070. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Simda


Vendor detections: 12


Intelligence 12 IOCs YARA 9 File information Comments

SHA256 hash: b28f6f96ccd229d069fde330a7a960c9fc7b7f60c2b43e6f9db4fadfa1cba070
SHA3-384 hash: 9e121729d6e79c979ce64830a5be7b312897a1e5f6b644e055cb0fc8376a6d7e2b4941dcaa3f955670f9f38ced04e56b
SHA1 hash: 0e67ad02d6edc5607165b0c12feeeb2a6a41a820
MD5 hash: fde464932774f8930242b30c923de215
humanhash: cat-timing-salami-queen
File name:svchost.exe
Download: download sample
Signature Simda
File size:201'216 bytes
First seen:2025-11-23 09:28:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 98aa7065495f35513795744857924eba (17 x Simda)
ssdeep 6144:2t++Jbojf5Vq5OC4qZhZcKYhc/ZfUozYt:h+cff22qZhZcKYhc/Q
Threatray 60 similar samples on MalwareBazaar
TLSH T14D14123253098DD2D9120DB745F1978115FDD939A3E1C24BAA26054F396ABA33CBCF2E
TrID 30.2% (.EXE) Win64 Executable (generic) (10522/11/4)
18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
14.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.9% (.EXE) Win32 Executable (generic) (4504/4/1)
5.9% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter Hexastrike
Tags:exe Simda

Intelligence


File Origin
# of uploads :
1
# of downloads :
20
Origin country :
IE IE
Vendor Threat Intelligence
Gathering data
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Creating a process from a recently created file
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file
Sending a custom TCP request
Searching for the anti-virus window
Moving of the original file
Query of malicious DNS domain
Enabling autorun
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context crypt installer-heuristic packed xpack
Result
Gathering data
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2025-11-23 08:24:28 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
31 of 36 (86.11%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:simda discovery persistence stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Modifies WinLogon
Executes dropped EXE
Modifies WinLogon for persistence
Simda family
simda
Unpacked files
SH256 hash:
b28f6f96ccd229d069fde330a7a960c9fc7b7f60c2b43e6f9db4fadfa1cba070
MD5 hash:
fde464932774f8930242b30c923de215
SHA1 hash:
0e67ad02d6edc5607165b0c12feeeb2a6a41a820
SH256 hash:
81c2f0a1f94c31380dced5c9c3a33e04c22f25c8de1fabfd5dbd168428c62e15
MD5 hash:
1329c539f94ada8c969d9d6ccc960d71
SHA1 hash:
ac06ec5eb8d110dd3989b3c397da604a16caba39
Detections:
win_simda_auto win_simda_g1 win_simda_g0 Simda MALWARE_Win_Simda
SH256 hash:
2826dacdb14975648ca72341a1671a0ab8b2abf82612b4b2abe7920c49a8aece
MD5 hash:
6b42d26beb9772be80441e5e0dd7e12d
SHA1 hash:
07cea265210368b3eca62653ec23b0f5b0db0525
Detections:
win_simda_auto win_simda_g1 win_simda_g0 Simda MALWARE_Win_Simda
Parent samples :
7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b
d7db5171f51590f6eb1f7250eb75203b68ea0e9ba29a60457776338c5a9c9dc3
a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668
096565e7dba18a134a70a87f1bc7158f31007366958a3fa637ffc23085168275
097bd5475473d973ae87074af9b1b69a315c926d93a86fa48f89021b80610252
12c30a3047bd7ca6f04361d79c1a9a4105c8cd240baf09d9a191149dd944ba45
168ad18cfd1a72b60b43311145a51cc070a38ff0764fdd062b221bdee094d2fc
1958ad830c697392c00bd4ce5cd4c4344450ae70a04f5c117ada33507dc89ffa
1ff3b686268fb31afae4ff1347cf8a6246b2ff01dd6f51b2fd2b450437e7dbd1
2592990b0849e15d4de9d19ee6e5cfbf99a5dd04f64f233dd5c3aa95f49ecd8c
2ef62badb31a555ea89d953850b28c6ac0c3839eb11a0d48f6bfd9e4cc09a8fb
2f4045740d2e0ca3f5a49c0465a466888e85aec48055d6d38e687a1634f9a1ff
3b99d46e75073297874ddfe85ef87c3589aa65ffa9ce29abe4a23f115acbdc46
3f5c1eedcdf3887b5b400a144d15e1da1d231b3cd270c5bcf661b375e4a857ab
42e4b4f9e119dff9be5cf64f1243b37d0e38832c7fbbeec01aed8f15a61d95a9
536e70798dab08ea627c1b86a7ad8a4918d768a93de68dce01896ed4cffc9c6c
5f6b52e9ace72e85b26efc1947e4faf7d626e332d566549408ce3a7c08120339
5fbfbb3b756e899d2a5cbd53bb4dc4bb73758bd2b6ddaca123f667de1a9c0420
70dd0e2b0cade900551fd86f289d98416738c0fff4070b0f33dc700434e4b666
7b7facba08d67d7d0998d7416ff2e22e428de4c680b87217031f7167ca10fdb0
89971a4d4fb74a5b249004c462e1130716f900226aba8651ba69700a61c2096b
8ae793193707e379e7930d83ee07f42932835668c99d58c1a14db573e8762736
acbf1197865587755eba928323c83304bb69439d71f3f55836e4c51c1eb0160f
b28f6f96ccd229d069fde330a7a960c9fc7b7f60c2b43e6f9db4fadfa1cba070
b8f9bbc6c289911023115142fe3c66ee609b9d45aa10d5652240b3a29638ae43
c50adcfe1afa21d18b8ced2ab1873e6fda049adcb933e6f5c421c9c78f90761d
c54c78b0605b256c90ead23916267a4935f796d2837cbe4549130a1f2096c976
d8c98b51b8a34ea664aec1de873dac0d28491fa84f672c4b737594a7010f6343
e0aa628757ed96d02e2ed4ce43131f0ef390839d5deee079cd0b140ceb78de8c
SH256 hash:
c44fab97408f6c7a0c613d2f30774cbff93f3c06c4c1bf9003aaede6e65aed77
MD5 hash:
a5efdd23f9018f2c72bd14755a20fd9e
SHA1 hash:
e1fac00817755c26c377ea8537594b84a0f3c395
Detections:
win_simda_auto win_simda_g1 win_simda_g0 Simda MALWARE_Win_Simda
Parent samples :
e1376b3c7237ef685ffe4185857ca13dd03f579fb009740b1d70225a04900734
7ef95304b8e240cba2fddbc90e13d5e8fead7dd65c6c2cddc0e11af14198703b
d7db5171f51590f6eb1f7250eb75203b68ea0e9ba29a60457776338c5a9c9dc3
a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668
096565e7dba18a134a70a87f1bc7158f31007366958a3fa637ffc23085168275
097bd5475473d973ae87074af9b1b69a315c926d93a86fa48f89021b80610252
12c30a3047bd7ca6f04361d79c1a9a4105c8cd240baf09d9a191149dd944ba45
168ad18cfd1a72b60b43311145a51cc070a38ff0764fdd062b221bdee094d2fc
1958ad830c697392c00bd4ce5cd4c4344450ae70a04f5c117ada33507dc89ffa
1ff3b686268fb31afae4ff1347cf8a6246b2ff01dd6f51b2fd2b450437e7dbd1
2592990b0849e15d4de9d19ee6e5cfbf99a5dd04f64f233dd5c3aa95f49ecd8c
2ef62badb31a555ea89d953850b28c6ac0c3839eb11a0d48f6bfd9e4cc09a8fb
2f4045740d2e0ca3f5a49c0465a466888e85aec48055d6d38e687a1634f9a1ff
3b99d46e75073297874ddfe85ef87c3589aa65ffa9ce29abe4a23f115acbdc46
3f5c1eedcdf3887b5b400a144d15e1da1d231b3cd270c5bcf661b375e4a857ab
42e4b4f9e119dff9be5cf64f1243b37d0e38832c7fbbeec01aed8f15a61d95a9
536e70798dab08ea627c1b86a7ad8a4918d768a93de68dce01896ed4cffc9c6c
5f6b52e9ace72e85b26efc1947e4faf7d626e332d566549408ce3a7c08120339
5fbfbb3b756e899d2a5cbd53bb4dc4bb73758bd2b6ddaca123f667de1a9c0420
70dd0e2b0cade900551fd86f289d98416738c0fff4070b0f33dc700434e4b666
7b7facba08d67d7d0998d7416ff2e22e428de4c680b87217031f7167ca10fdb0
89971a4d4fb74a5b249004c462e1130716f900226aba8651ba69700a61c2096b
8ae793193707e379e7930d83ee07f42932835668c99d58c1a14db573e8762736
acbf1197865587755eba928323c83304bb69439d71f3f55836e4c51c1eb0160f
b28f6f96ccd229d069fde330a7a960c9fc7b7f60c2b43e6f9db4fadfa1cba070
b8f9bbc6c289911023115142fe3c66ee609b9d45aa10d5652240b3a29638ae43
c50adcfe1afa21d18b8ced2ab1873e6fda049adcb933e6f5c421c9c78f90761d
c54c78b0605b256c90ead23916267a4935f796d2837cbe4549130a1f2096c976
d8c98b51b8a34ea664aec1de873dac0d28491fa84f672c4b737594a7010f6343
e0aa628757ed96d02e2ed4ce43131f0ef390839d5deee079cd0b140ceb78de8c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:MALWARE_Win_Simda
Author:ditekShen
Description:Detects Simda / Shifu infostealer
Rule name:NET
Author:malware-lu
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Windows_Trojan_Zeus_e51c60d7
Author:Elastic Security
Description:Detects strings used in Zeus web injects. Many other malware families are built on Zeus and may hit on this signature.
Reference:https://www.virusbulletin.com/virusbulletin/2014/10/paper-evolution-webinjects
Rule name:win_simda_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.simda.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments