MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 61729f49fe5285f91009c0ed57a6f96d22b96e5d87dfd0574636adce721979ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Socks5Systemz
Vendor detections: 11
| SHA256 hash: | 61729f49fe5285f91009c0ed57a6f96d22b96e5d87dfd0574636adce721979ad |
|---|---|
| SHA3-384 hash: | 083c86678316b63928dbde3f484d3379193cdcb069cbbbc72bbdd22a75b59f353f77426ab05d1c6adca62ba3294d5060 |
| SHA1 hash: | c49845cbbaed674574557b6063af73e673bebfb3 |
| MD5 hash: | eefb08cdd9ed237803a576ed5f931c91 |
| humanhash: | beryllium-fruit-lemon-paris |
| File name: | file |
| Download: | download sample |
| Signature | Socks5Systemz |
| File size: | 7'334'088 bytes |
| First seen: | 2023-12-12 18:23:20 UTC |
| Last seen: | 2023-12-12 20:22:59 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'456 x Socks5Systemz, 262 x RaccoonStealer) |
| ssdeep | 196608:qxm5oXBu6MoSaRSw/73svHtV3fwAUwvqw18yUtEvpCUGcXkPzj:f6MoSKSDvH3PwXwvqdPUzkPzj |
| Threatray | 6'717 similar samples on MalwareBazaar |
| TLSH | T1C57633D1AEE45D22E8598E3178254039E6B6BDEA4F344CB430BC937E975668C825CF33 |
| TrID | 80.0% (.EXE) Inno Setup installer (107240/4/30) 10.5% (.EXE) Win32 Executable Delphi generic (14182/79/4) 3.3% (.EXE) Win32 Executable (generic) (4505/5/1) 1.5% (.EXE) Win16/32 Executable Delphi generic (2072/23) 1.5% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 00f8dcdcdcbebe00 (621 x Socks5Systemz) |
| Reporter | |
| Tags: | exe Socks5Systemz |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_EXE_Packed_VMProtect |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with VMProtect. |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.