MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4fb561dbdfd2eac3757e56df1cda954fc4cdbab3da7225ea97ed3a9111ae74e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SystemBC


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: 4fb561dbdfd2eac3757e56df1cda954fc4cdbab3da7225ea97ed3a9111ae74e5
SHA3-384 hash: 3bb8ac1c0d5f8f766ba2f70162988e85d0a00ff8998661d5f5256185a0f2b72f73fce8bb4260d44dc37be28bb89e1157
SHA1 hash: 56fa38589ebc1653d285aaaf9f79426ac5f1d826
MD5 hash: ab80e92fbdd11c699d650a455de769d0
humanhash: indigo-north-island-zulu
File name:ab80e92fbdd11c699d650a455de769d0
Download: download sample
Signature SystemBC
File size:401'920 bytes
First seen:2021-06-24 09:09:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 621d175e940c3f2ca7217a398b3c22a6 (11 x RedLineStealer, 2 x DarkVNC, 1 x ArkeiStealer)
ssdeep 6144:EQIdSICY4BZ2Cf4tY+mlqI1PVoRrF226bkjozldKM2Xd7koDUCG5w4cpEHKriC:GdSvY4BZz4t8qIE5F76osetYeUJVvl
Threatray 124 similar samples on MalwareBazaar
TLSH 5184AF10F6A0C035F2F765F85A7693A9A53E7AF1672450CF62D52AEE0A347E0AC31317
Reporter zbetcheckin
Tags:32 exe SystemBC

Intelligence


File Origin
# of uploads :
1
# of downloads :
145
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ab80e92fbdd11c699d650a455de769d0
Verdict:
Malicious activity
Analysis date:
2021-06-24 09:37:24 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
92 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 439743 Sample: FoQGVXmWdZ Startdate: 24/06/2021 Architecture: WINDOWS Score: 92 31 Multi AV Scanner detection for dropped file 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Machine Learning detection for sample 2->35 37 Machine Learning detection for dropped file 2->37 7 FoQGVXmWdZ.exe 1 1 2->7         started        11 rundll32.exe 2->11         started        13 rundll32.exe 2->13         started        process3 file4 27 C:\Users\user\AppData\Roaming\valid.sa, PE32 7->27 dropped 41 Detected unpacking (changes PE section rights) 7->41 43 Detected unpacking (overwrites its own PE header) 7->43 45 Creates an autostart registry key pointing to binary in C:\Windows 7->45 15 rundll32.exe 7->15         started        18 cmd.exe 1 7->18         started        20 rundll32.exe 11->20         started        23 rundll32.exe 13->23         started        signatures5 process6 dnsIp7 29 65.21.93.53, 4173, 49725, 49726 CP-ASDE United States 15->29 25 conhost.exe 18->25         started        39 System process connects to network (likely due to code injection or exploit) 20->39 signatures8 process9
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-06-21 00:46:49 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
systembc
Score:
  10/10
Tags:
family:systembc persistence trojan
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
Deletes itself
Loads dropped DLL
Blocklisted process makes network request
SystemBC
Malware Config
C2 Extraction:
65.21.93.53:4173
95.216.118.223:4173
Unpacked files
SH256 hash:
b541fd68db54a8aa8fddf22889ad5ebc5316757d3b6abc1866c502d225a48945
MD5 hash:
9cac668055b635f6ce2ae9c9e71dfff8
SHA1 hash:
356b9159a80e4b85e405d93780031715e1087065
Detections:
win_systembc_auto
SH256 hash:
538efbeb594940283c4f295a3075a42c98109b3a2c60c0d0593030de4bbcf7be
MD5 hash:
c8dea9d334c7e5b64ce1ce1b2dd8992e
SHA1 hash:
ca41fe094ad4b7160a6b5393d984ca6158c93794
SH256 hash:
79545db8780df61c81cca1ec86f284479f34e56ce98efa6be608130373f4fea2
MD5 hash:
6eee343a6f36956dcb5e72a45c1ef5eb
SHA1 hash:
09147042c5b86b6f00c9e38f3ae161827c5f8f6d
SH256 hash:
4fb561dbdfd2eac3757e56df1cda954fc4cdbab3da7225ea97ed3a9111ae74e5
MD5 hash:
ab80e92fbdd11c699d650a455de769d0
SHA1 hash:
56fa38589ebc1653d285aaaf9f79426ac5f1d826
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_EXEPWSH_DLAgent
Author:ditekSHen
Description:Detects downloader agent, using PowerShell
Rule name:Start2_net_bin
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:Start2_overlap_bin
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:Start2__bin
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SystemBC

Executable exe 4fb561dbdfd2eac3757e56df1cda954fc4cdbab3da7225ea97ed3a9111ae74e5

(this sample)

  
Delivery method
Distributed via web download

Comments