MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2fdc4c2698bb27b5123709314702ade5ba324dae00c1b45dcb5f521810a40849. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: 2fdc4c2698bb27b5123709314702ade5ba324dae00c1b45dcb5f521810a40849
SHA3-384 hash: 3bcbca70cde702c1bb3db0d9a60843dc70d275248181954b84668147fd9db3d5fad7be049ace96d378be8d94e1f52141
SHA1 hash: 5d8f0435ebe5bddbae45829818c22ad5af712776
MD5 hash: 8e77d835ff082165c2de8e94c131587e
humanhash: cola-bacon-fifteen-comet
File name:SecuriteInfo.com.Trojan-Dropper.Win32.Agent.9252.18757
Download: download sample
Signature Socks5Systemz
File size:4'793'439 bytes
First seen:2023-12-31 13:22:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'455 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 98304:QkBlcXZwQcHIQVF+/x24ujgWD4W8m0d/mwpnh1Qy8c1YDatp4dm8:3EZ7c7+/Vre4nm2hT8UYGtp4dD
Threatray 70 similar samples on MalwareBazaar
TLSH T18B2633DA2E1A46B8C4F1973499BF6F183A7247049CF0899CAA5DDC0CCF66045E71937B
TrID 76.2% (.EXE) Inno Setup installer (107240/4/30)
10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:exe Socks5Systemz

Intelligence


File Origin
# of uploads :
1
# of downloads :
273
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
phorpiex
ID:
1
File name:
4363463463464363463463463.exe
Verdict:
Malicious activity
Analysis date:
2023-12-31 10:58:41 UTC
Tags:
hausbomber loader opendir autoit evasion phorpiex trojan redline parallax remote stealer kelihos stealc dupzom arechclient2 backdoor agenttesla amadey lumma dcrat socks5systemz proxy servstart

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching the process to interact with network services
Modifying a system file
Creating a file
Creating a service
Launching a process
Sending a custom TCP request
Enabling autorun for a service
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Argotronic GmbH
Verdict:
Suspicious
Result
Threat name:
Petite Virus, Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of debugger detection
Multi AV Scanner detection for submitted file
PE file has nameless sections
Snort IDS alert for network traffic
Yara detected Petite Virus
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Runs net.exe
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Unpacked files
SH256 hash:
767ce02dfc52bc478b9442e4e46396e6e97f21de1a30456a126ca7e56399f158
MD5 hash:
fd57bccfc39411ba5f7e599ba94cc996
SHA1 hash:
f95babe6c42eb277fd2ba4a9985d27aa386fccff
Detections:
INDICATOR_EXE_Packed_VMProtect
SH256 hash:
7867e68ccdf39fe49214e36027fe1e05d6008cb96b347fa6d7830791f0e4e05f
MD5 hash:
7c072e9b89dd846377dcb16cbc446019
SHA1 hash:
5c7bfee0e3e4c14482e734f3b2bb71148cd722ee
SH256 hash:
77c9c65113999e8111d36dce49651dec97b24deea62af51fd0289853494242eb
MD5 hash:
23d8a37431bb3cce837bce4d4d5a792e
SHA1 hash:
9bb53a335bf21c35b9ec4f770af19e70df026296
SH256 hash:
fc0e0be9e8a8fc0a80901acb250f437ef8265ed44f21d094a7e7b4cf4c9d2eb5
MD5 hash:
da4cc68c7a6844cc60fffa3da8ad861d
SHA1 hash:
4c1783ad4b55893ac783f06684702c0648e7b495
SH256 hash:
50a5b5794265e58ffe045f32f9941d3c494e5895746f4c16e4ee258a1c1636b1
MD5 hash:
ca54d42870def4a20c0caa914be8fadd
SHA1 hash:
3fb28856ddc1115e91b7bed86902c57327d73a15
SH256 hash:
2fdc4c2698bb27b5123709314702ade5ba324dae00c1b45dcb5f521810a40849
MD5 hash:
8e77d835ff082165c2de8e94c131587e
SHA1 hash:
5d8f0435ebe5bddbae45829818c22ad5af712776
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Socks5Systemz

Executable exe 2fdc4c2698bb27b5123709314702ade5ba324dae00c1b45dcb5f521810a40849

(this sample)

Comments