MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2943a108d98faef6c3411f0ad1235f85f3196cff70cd7d48565c92d0a21d060. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 14


Intelligence 14 IOCs YARA 10 File information Comments

SHA256 hash: f2943a108d98faef6c3411f0ad1235f85f3196cff70cd7d48565c92d0a21d060
SHA3-384 hash: e81e5c9cae3b68f4948ce43960c5155e631ce72f93f4f52122660177abc0da25a39516368c00487400a24e54805eec39
SHA1 hash: 6df752a5495f939b224bd8bbdc4098b07273dd00
MD5 hash: 03d5ff66fed634a8f8c45efb31aea013
humanhash: four-snake-south-november
File name:Disk-Only-S00fer.exe
Download: download sample
File size:6'162'432 bytes
First seen:2025-07-21 18:46:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7af9d139fdc69dd2700eb5a432494d54
ssdeep 98304:ebpUAYNESLAzubj88ZBDEDaTNzmKz6vdEr+AP+G0sT8PjH9Un:ebpU6hfy2i6EQbU
TLSH T1A55623A249EA10FCE1C3CB3091537A5DEAB174BA47A4D6CF35C168026D72AC6D619F33
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter burger
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
20
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Disk-Only-S00fer.exe
Verdict:
Malicious activity
Analysis date:
2025-07-21 18:46:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus sage smtp
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm base64 crypto microsoft_visual_cc packed
Result
Threat name:
n/a
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Benign windows process drops PE files
Excessive usage of taskkill to terminate processes
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Sample is not signed and drops a device driver
Writes to foreign memory regions
Yara detected GDRV Vulnerable Kernel Driver
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1741541 Sample: Disk-Only-S00fer.exe Startdate: 21/07/2025 Architecture: WINDOWS Score: 100 46 Antivirus / Scanner detection for submitted sample 2->46 48 Multi AV Scanner detection for dropped file 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 2 other signatures 2->52 8 Disk-Only-S00fer.exe 2->8         started        process3 signatures4 54 Writes to foreign memory regions 8->54 56 Allocates memory in foreign processes 8->56 58 Modifies the context of a thread in another process (thread injection) 8->58 60 Injects a PE file into a foreign processes 8->60 11 svchost.exe 4 3 8->11         started        15 WerFault.exe 19 16 8->15         started        process5 file6 40 C:\Windows\System32\qvb3DsEz.sys, PE32+ 11->40 dropped 42 C:\Windows\System32\4Gspkpup.sys, PE32+ 11->42 dropped 62 Benign windows process drops PE files 11->62 64 Sample is not signed and drops a device driver 11->64 17 cmd.exe 1 11->17         started        20 cmd.exe 1 11->20         started        22 cmd.exe 1 11->22         started        24 19 other processes 11->24 signatures7 process8 signatures9 44 Excessive usage of taskkill to terminate processes 17->44 26 taskkill.exe 1 17->26         started        28 taskkill.exe 1 20->28         started        30 taskkill.exe 1 22->30         started        32 taskkill.exe 1 24->32         started        34 taskkill.exe 1 24->34         started        36 taskkill.exe 1 24->36         started        38 11 other processes 24->38 process10
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) Win 64 Exe x64
Threat name:
Win64.Trojan.Lazy
Status:
Malicious
First seen:
2025-07-21 18:46:19 UTC
File Type:
PE+ (Exe)
Extracted files:
5
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion discovery execution persistence
Behaviour
Kills process with taskkill
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Network Configuration Discovery: Internet Connection Discovery
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Sets service image path in registry
Stops running service(s)
Unpacked files
SH256 hash:
f2943a108d98faef6c3411f0ad1235f85f3196cff70cd7d48565c92d0a21d060
MD5 hash:
03d5ff66fed634a8f8c45efb31aea013
SHA1 hash:
6df752a5495f939b224bd8bbdc4098b07273dd00
SH256 hash:
e77cf4236e828292cb48b7c656f42b58cf2ba6058c83e0dac0fea8206900d6cd
MD5 hash:
490db8cf834a1d4935cfbf207a294b08
SHA1 hash:
3196cfadaf0f0a24144ba276047b54c63d68d8de
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:signed_sys_with_vulnerablity
Author:wonderkun
Description:signed_sys_with_vulnerablity
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vulnerablity_driver2_PhysicalMemory
Author:wonderkun
Description:vulnerablity_driver2_PhysicalMemory
Rule name:Windows_VulnDriver_GDrv_5368078b
Author:Elastic Security
Description:Name: gdrv.sys, Version: 5.2.3790.1830

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::WriteProcessMemory
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsapi-ms-win-crt-runtime-l1-1-0.dll::_get_narrow_winmain_command_line

Comments