MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48f9310ae3bd7b1b5ac53aad0ede4db7c136193369d4d2c58cec0f05ddddf84f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 48f9310ae3bd7b1b5ac53aad0ede4db7c136193369d4d2c58cec0f05ddddf84f
SHA3-384 hash: 792e93187bb2eb781812fc2c584f0ae8c08e7d47c78d1abce3f49db66fd661436a33aca0fdea912630ba512706f6d6da
SHA1 hash: ac34dbfa7a265f9d304549894a4dd58f904b6ac2
MD5 hash: 6d0f48e2159943dfe9112af24bc23e18
humanhash: purple-carpet-lemon-texas
File name:6d0f48e2159943dfe9112af24bc23e18.exe
Download: download sample
Signature Socks5Systemz
File size:4'698'419 bytes
First seen:2024-01-11 02:05:10 UTC
Last seen:2024-01-11 03:32:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'455 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 98304:Q3AwCn49gw8kHdkG4QShZY2zwTkT5QmzCP+2zB/8tGZzf4dm8:7wCn4ibEd5ismwQtVCPDzB6GZT4dD
Threatray 19 similar samples on MalwareBazaar
TLSH T113263343EBE47526C1E087B6DC9986ACF73973B2D9B0735954D9A81E0B638C1C04B7B8
TrID 76.2% (.EXE) Inno Setup installer (107240/4/30)
10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter abuse_ch
Tags:exe Socks5Systemz


Avatar
abuse_ch
Socks5Systemz C2:
185.196.8.22:80

Intelligence


File Origin
# of uploads :
2
# of downloads :
332
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Searching for synchronization primitives
Creating a file
Moving a recently created file
Launching the process to interact with network services
Modifying a system file
Creating a service
Launching a process
Enabling autorun for a service
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Argotronic GmbH
Verdict:
Suspicious
Result
Threat name:
Petite Virus, Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Snort IDS alert for network traffic
Yara detected Petite Virus
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1372779 Sample: K5IdObg3FZ.exe Startdate: 11/01/2024 Architecture: WINDOWS Score: 100 42 Snort IDS alert for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 48 8 other signatures 2->48 8 K5IdObg3FZ.exe 2 2->8         started        process3 file4 28 C:\Users\user\AppData\...\K5IdObg3FZ.tmp, PE32 8->28 dropped 11 K5IdObg3FZ.tmp 18 61 8->11         started        process5 file6 30 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 11->30 dropped 32 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 11->32 dropped 34 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 11->34 dropped 36 79 other files (64 malicious) 11->36 dropped 14 dvdreportviewer.exe 1 15 11->14         started        17 dvdreportviewer.exe 1 2 11->17         started        20 net.exe 1 11->20         started        process7 dnsIp8 38 bwowidw.com 185.196.8.22, 49734, 49737, 49739 SIMPLECARRER2IT Switzerland 14->38 40 65.109.80.185, 2023, 49735, 49738 ALABANZA-BALTUS United States 14->40 26 C:\ProgramData\...\MIME post encoding 71.exe, PE32 17->26 dropped 22 conhost.exe 20->22         started        24 net1.exe 1 20->24         started        file9 process10
Result
Malware family:
socks5systemz
Score:
  10/10
Tags:
family:socks5systemz botnet discovery
Behaviour
Runs net.exe
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Detect Socks5Systemz Payload
Socks5Systemz
Unpacked files
SH256 hash:
bb45d7c23131546e19425cedfd0fd73b2df7034c1a8a2b2b4931efb2591fd742
MD5 hash:
33069a81f3c424e310fa7fdb1579a21d
SHA1 hash:
b1dc47d3428caabe222ccdbe658a14fdd28190a6
Detections:
INDICATOR_EXE_Packed_VMProtect
SH256 hash:
8e372eb0f616d2ed821684e4c6ebd9003ec338d62511548c765230556b2ce84a
MD5 hash:
6e89ed7416993836e6bd3a68f74fbbf9
SHA1 hash:
46ae6b9f68ad8498e9e0f6e23ecefef92f3d38ca
SH256 hash:
263f9b6e39c986646e589d23526240b3d35439023920b4604bcbfdb7eb4899a0
MD5 hash:
a9b3dd0384b4975010bf93534a0c106d
SHA1 hash:
7dfe735904e8573e1778f9caf7fdfb269dbbaf51
SH256 hash:
c855133d7c6d2f6f8a615450b73ee4caad30428ce7112847e7d3727ddec36130
MD5 hash:
618db65b83438ee9e0b0e1e5b64c1cff
SHA1 hash:
40f7ee069715bca8b37dd6b33b1d0677d47da4e4
SH256 hash:
48f9310ae3bd7b1b5ac53aad0ede4db7c136193369d4d2c58cec0f05ddddf84f
MD5 hash:
6d0f48e2159943dfe9112af24bc23e18
SHA1 hash:
ac34dbfa7a265f9d304549894a4dd58f904b6ac2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Socks5Systemz

Executable exe 48f9310ae3bd7b1b5ac53aad0ede4db7c136193369d4d2c58cec0f05ddddf84f

(this sample)

Comments