MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e1376b3c7237ef685ffe4185857ca13dd03f579fb009740b1d70225a04900734. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Simda
Vendor detections: 14
| SHA256 hash: | e1376b3c7237ef685ffe4185857ca13dd03f579fb009740b1d70225a04900734 |
|---|---|
| SHA3-384 hash: | b63b0fc56d5d9c0cbd288e7a827457df310678e07269eff5e374c3587b5036b28628096b3ffbe875376bfb2d0f224a1f |
| SHA1 hash: | ec97bde09deca0e88679cf356b6fcd5d8dd7f8a6 |
| MD5 hash: | af29a38b6f5daf91fc870a963df19326 |
| humanhash: | fifteen-ack-triple-potato |
| File name: | spug64.exe |
| Download: | download sample |
| Signature | Simda |
| File size: | 206'648 bytes |
| First seen: | 2023-12-24 20:37:57 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 98aa7065495f35513795744857924eba (17 x Simda) |
| ssdeep | 6144:Xt++Jbojf5Vq5OC4qZhZcKYhc/ZfUozY:c+cff22qZhZcKYhc/ |
| Threatray | 3 similar samples on MalwareBazaar |
| TLSH | T15F14127313098DA2DD120EB741F1D74219FAE638A3E0D18B6625058B3D56BA33D6CE2F |
| TrID | 30.2% (.EXE) Win64 Executable (generic) (10523/12/4) 18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 14.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 12.9% (.EXE) Win32 Executable (generic) (4505/5/1) 5.9% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | 0000000000000100 (2 x Simda) |
| Reporter | |
| Tags: | 64 exe Simda |
Intelligence
File Origin
# of uploads :
1
# of downloads :
354
Origin country :
ROVendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Creating a process from a recently created file
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Connecting to a non-recommended domain
Searching for the anti-virus window
Moving of the original file
Query of malicious DNS domain
Enabling autorun
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
overlay packed xpack
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Simda
Verdict:
Malicious
Result
Threat name:
Simda Stealer
Detection:
malicious
Classification:
bank.troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Checks if browser processes are running
Contains functionality to behave differently if execute on a Russian/Kazak computer
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sandboxes (registry SystemBiosVersion/Date)
Contains functionality to infect the boot sector
Contains functionality to inject threads in other processes
Contains functionality to modify clipboard data
Contains VNC / remote desktop functionality (version string found)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found evasive API chain (may stop execution after checking volume information)
Found evasive API chain checking for user administrative privileges
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Moves itself to temp directory
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries random domain names (often used to prevent blacklisting and sinkholes)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
Yara detected Simda Stealer
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Simda
Status:
Malicious
First seen:
2023-12-22 06:44:14 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
33 of 37 (89.19%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
n/a
Score:
10/10
Tags:
persistence
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Drops file in Windows directory
Modifies WinLogon
Executes dropped EXE
Loads dropped DLL
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
49da219b7410fb92a8e20f9ddc9b252b8e5a21f2e2553eaf976d4db583bfeaeb
MD5 hash:
e3593ec84a2667fd968c0f5eb947393d
SHA1 hash:
f3d39987b2277bf696d7d059b644b63a840b0267
Detections:
win_simda_auto
win_simda_g1
win_simda_g0
SH256 hash:
c44fab97408f6c7a0c613d2f30774cbff93f3c06c4c1bf9003aaede6e65aed77
MD5 hash:
a5efdd23f9018f2c72bd14755a20fd9e
SHA1 hash:
e1fac00817755c26c377ea8537594b84a0f3c395
Detections:
Simda
win_simda_auto
win_simda_g1
win_simda_g0
Parent samples :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 hash:
192454ea4beeb27ecff3dd27b0d87c145c26cf305c1e3554dd52ed2cbb4dbaa9
MD5 hash:
ad78252024f0a6ba7efd06c992874fde
SHA1 hash:
46dce87ad8b9abc314ef6ffa10197c5c66d84c1c
Detections:
Simda
win_simda_auto
win_simda_g1
win_simda_g0
SH256 hash:
e1376b3c7237ef685ffe4185857ca13dd03f579fb009740b1d70225a04900734
MD5 hash:
af29a38b6f5daf91fc870a963df19326
SHA1 hash:
ec97bde09deca0e88679cf356b6fcd5d8dd7f8a6
Malware family:
Shifu
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.