MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323
SHA3-384 hash: fdbd668f0d38109b19f0eb4dd3be6dded5828b3bc30f363c2ef25955be194ba1a4f64823028f5aee12fb2f71af9ae57f
SHA1 hash: f13d6f8987eb81173ada9be01be2a164f6b00ab8
MD5 hash: e850f5020fb5501d14bee48d7087e589
humanhash: island-charlie-maryland-fix
File name:e850f5020fb5501d14bee48d7087e589.exe
Download: download sample
Signature Socks5Systemz
File size:4'099'862 bytes
First seen:2024-01-11 20:40:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e92b45c54aa05ec107d5ef90662e6b33 (363 x GCleaner, 38 x Socks5Systemz, 3 x Backdoor.TeamViewer)
ssdeep 98304:eiligBB2JqtMtultlsSUWNBD1uIyth/pXo5UOCBPA2MO3T7D5fPxIkS:rMATUulzLUWHhzq+wsWBP+r
TLSH T1AE16332099C2097AC3B2D7706C3D8A78B4B7F62B12ADC0E99EDC1D5E5DE330E1D4A546
TrID 82.5% (.EXE) Inno Setup installer (107240/4/30)
10.9% (.EXE) Win32 Executable Delphi generic (14182/79/4)
3.4% (.EXE) Win32 Executable (generic) (4505/5/1)
1.5% (.EXE) Generic Win/DOS Executable (2002/3)
1.5% (.EXE) DOS Executable Generic (2000/1)
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter abuse_ch
Tags:exe Socks5Systemz


Avatar
abuse_ch
Socks5Systemz C2:
185.196.8.22:80

Intelligence


File Origin
# of uploads :
1
# of downloads :
378
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Creating a file
Moving a recently created file
Launching the process to interact with network services
Modifying a system file
Creating a service
Launching a process
Sending a custom TCP request
Enabling autorun for a service
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control installer lolbin overlay packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Argotronic GmbH
Verdict:
Suspicious
Result
Threat name:
Petite Virus, Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Snort IDS alert for network traffic
Yara detected Petite Virus
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1373346 Sample: XA8GMaaL52.exe Startdate: 11/01/2024 Architecture: WINDOWS Score: 100 42 Snort IDS alert for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Antivirus detection for dropped file 2->46 48 8 other signatures 2->48 8 XA8GMaaL52.exe 2 2->8         started        process3 file4 28 C:\Users\user\AppData\Local\...\is-CFRMH.tmp, PE32 8->28 dropped 11 is-CFRMH.tmp 13 69 8->11         started        process5 file6 30 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 11->30 dropped 32 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 11->32 dropped 34 C:\Users\user\AppData\...\unins000.exe (copy), PE32 11->34 dropped 36 77 other files (62 malicious) 11->36 dropped 14 pcidevicechecker.exe 1 15 11->14         started        17 pcidevicechecker.exe 1 2 11->17         started        20 net.exe 1 11->20         started        process7 dnsIp8 38 bgfoipb.com 185.196.8.22, 49712, 49715, 49717 SIMPLECARRER2IT Switzerland 14->38 40 65.109.80.185, 2023, 49713, 49716 ALABANZA-BALTUS United States 14->40 26 C:\ProgramData\...\MIME post encoding 71.exe, PE32 17->26 dropped 22 conhost.exe 20->22         started        24 net1.exe 1 20->24         started        file9 process10
Threat name:
Win32.Trojan.Sockssystemz
Status:
Malicious
First seen:
2024-01-11 20:41:06 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
socks5systemz
Score:
  10/10
Tags:
family:socks5systemz botnet discovery
Behaviour
Runs net.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Detect Socks5Systemz Payload
Socks5Systemz
Unpacked files
SH256 hash:
1ecb8e6ebd48b29c85897c9833efd6e3f81a2ce9c2f165cd7c40da8187d88cea
MD5 hash:
9fc488268852ea2f1d7ce3b6c1987a32
SHA1 hash:
d3f53b752c422df8ddc8f8b323241147de531e2f
Detections:
INDICATOR_EXE_Packed_VMProtect
SH256 hash:
8e372eb0f616d2ed821684e4c6ebd9003ec338d62511548c765230556b2ce84a
MD5 hash:
6e89ed7416993836e6bd3a68f74fbbf9
SHA1 hash:
46ae6b9f68ad8498e9e0f6e23ecefef92f3d38ca
SH256 hash:
3a44bdbde9dbf8e84f2fa55aed54a990a59f98ce6a823b9e32c6252a1c7f56dd
MD5 hash:
1dcaa8f6f2be3f9b6de067962d314a1e
SHA1 hash:
73e08987f43698522fe693964ae55ff0222b9d20
SH256 hash:
d745fa8221cbac093c600c1cdab8587d89a326d50e04e1a983868da2a8f16c46
MD5 hash:
632b56348452ab813b6521dbcfa181e9
SHA1 hash:
45abcbf551d9b619cb48f14ae0a391f6b6855ffc
SH256 hash:
bdbdf4aac2625c0bdcfbce0ee195b77c0d9973cb606f75147b4dc4430c9c4614
MD5 hash:
79830cacdb090d0ad421650befe01b8c
SHA1 hash:
203bc1c1d7e5f9fe99f61f5edd412d9232c33f82
SH256 hash:
56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323
MD5 hash:
e850f5020fb5501d14bee48d7087e589
SHA1 hash:
f13d6f8987eb81173ada9be01be2a164f6b00ab8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Socks5Systemz

Executable exe 56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323

(this sample)

Comments