MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 50d803405e13a8749bbbc53185cc4e3d104ab2dd1d85e3c4c375a95697908ba1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SystemBC


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: 50d803405e13a8749bbbc53185cc4e3d104ab2dd1d85e3c4c375a95697908ba1
SHA3-384 hash: f6fdbdc9e73cec192d307fcfac8d174abd3d83cde08ba8076b03fa6ab714ed0ac8d6084806f278e33c0d17a541333eb3
SHA1 hash: ef352460956ae1daddedd9bb5cc6a3e82eaa9f84
MD5 hash: 36317e75e7e6b397e3601a6f57d47869
humanhash: harry-video-mike-indigo
File name:36317e75e7e6b397e3601a6f57d47869.exe
Download: download sample
Signature SystemBC
File size:475'632 bytes
First seen:2023-03-22 15:54:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 862ce0ec68439a837266e9c0bd164293 (1 x SystemBC)
ssdeep 6144:bU8mdthp2dsUmpiBXCAbiklSV1vGw5dTB6HQo4+HqEV2XlicY26C1:ep2OMCAmDVUw5d4nqEc20
TLSH T1DCA4CF523E93C0B3D28100326E66877B9FB9F5652724E1C3B7EE4460AF61E92E739345
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe SystemBC

Intelligence


File Origin
# of uploads :
1
# of downloads :
247
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
36317e75e7e6b397e3601a6f57d47869.exe
Verdict:
No threats detected
Analysis date:
2023-03-22 15:55:28 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for the window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
explorer.exe greyware overlay packed sality virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Disables user account control notifications
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May modify the system service descriptor table (often done to hook functions)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Yara detected Sality
Behaviour
Behavior Graph:
Threat name:
Win32.Virus.Sality
Status:
Malicious
First seen:
2023-03-18 22:38:01 UTC
File Type:
PE (Exe)
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:sality backdoor evasion trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Drops file in Windows directory
Checks whether UAC is enabled
UPX packed file
Windows security modification
Modifies firewall policy service
Sality
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Unpacked files
SH256 hash:
2e4e816f5839e007149a8987d871776a64b5eeea9a3df7f71b0db12b9ed8d517
MD5 hash:
57cde8ddd4261277272a6151855f8966
SHA1 hash:
9afc39cfad97a3ce12949b65c05f438025fdbac2
Detections:
sality win_sality_auto win_sality_g0
SH256 hash:
50d803405e13a8749bbbc53185cc4e3d104ab2dd1d85e3c4c375a95697908ba1
MD5 hash:
36317e75e7e6b397e3601a6f57d47869
SHA1 hash:
ef352460956ae1daddedd9bb5cc6a3e82eaa9f84
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Start2_net_mem
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:SystemBC_Config
Author:@bartblaze
Description:Identifies SystemBC RAT, decrypted config.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments