MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6a3625eb52aa5a3be2aa7992f8cc58ad5027fe8f382ddf034d31cb4b12754a53. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: 6a3625eb52aa5a3be2aa7992f8cc58ad5027fe8f382ddf034d31cb4b12754a53
SHA3-384 hash: 76d2ffce9a50f52495c81ff7571ac9334f1cc0bb21f9256cad746685c8b4ba9ae3539ddc571b43557c732ad5bf302add
SHA1 hash: a2bab36a927dbdeb3253fe01a8f16be5143553a5
MD5 hash: aa3fe792621add6ff5b63f416e7b212f
humanhash: asparagus-illinois-south-mango
File name:SecuriteInfo.com.FileRepMalware.31462.14367
Download: download sample
Signature Socks5Systemz
File size:6'344'377 bytes
First seen:2025-02-04 06:37:13 UTC
Last seen:2025-02-04 06:49:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'457 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 196608:SUeW8nH7UC5sRDgiDhQ60janmz3TgXi/hM73O:tmnoC5sRsiA2nEyYai
TLSH T15956339506507BF1E431E9B0DD18FA2C4B7BAA20BFB1B40877614CC58F279E1A8157EB
TrID 76.2% (.EXE) Inno Setup installer (107240/4/30)
10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:exe Socks5Systemz

Intelligence


File Origin
# of uploads :
2
# of downloads :
475
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.FileRepMalware.31462.14367
Verdict:
No threats detected
Analysis date:
2025-02-04 06:38:33 UTC
Tags:
inno installer delphi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun sality
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context borland_delphi fingerprint installer obfuscated overlay packed packer_detected
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
suspicious
Classification:
evad
Score:
30 / 100
Signature
Drops executables to the windows directory (C:\Windows) and starts them
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Suspicious GrpConv Execution
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1606247 Sample: SecuriteInfo.com.FileRepMal... Startdate: 04/02/2025 Architecture: WINDOWS Score: 30 44 Multi AV Scanner detection for submitted file 2->44 46 PE file has a writeable .text section 2->46 48 Sigma detected: Suspicious GrpConv Execution 2->48 8 SecuriteInfo.com.FileRepMalware.31462.14367.exe 2 2->8         started        process3 file4 26 SecuriteInfo.com.F...are.31462.14367.tmp, PE32 8->26 dropped 11 SecuriteInfo.com.FileRepMalware.31462.14367.tmp 27 27 8->11         started        process5 file6 28 C:\Windows\SysWOW64\myodbc3m.exe (copy), PE32 11->28 dropped 30 C:\Windows\SysWOW64\myodbc3i.exe (copy), PE32 11->30 dropped 32 C:\Windows\SysWOW64\myodbc3c.exe (copy), PE32 11->32 dropped 34 20 other files (none is malicious) 11->34 dropped 50 Drops executables to the windows directory (C:\Windows) and starts them 11->50 15 VBRUN60SP6.EXE 76 30 11->15         started        18 myodbc3i.exe 4 2 11->18         started        20 regsvr32.exe 44 11->20         started        signatures7 process8 file9 36 C:\Windows\Temp\OLD46A7.tmp, PE32 15->36 dropped 38 C:\Windows\Temp\OLD4629.tmp, PE32 15->38 dropped 40 C:\Windows\Temp\OLD4608.tmp, PE32 15->40 dropped 42 18 other files (none is malicious) 15->42 dropped 22 grpconv.exe 15->22         started        24 conhost.exe 18->24         started        process10
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence
Behaviour
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Boot or Logon Autostart Execution: Active Setup
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
5cbb18a78f8a2ac3a6488443d50cb5226bc0b6db43ec383deace24c60f26576b
MD5 hash:
c222d6400939aa4da6e1fb765c8039d1
SHA1 hash:
a53f86d07124f9f53c34d2a28bd5dab24eb0656b
SH256 hash:
99c0d32bd507dcdb6becbaa59fc14373523666910b327c8ce8bcec02a792bb56
MD5 hash:
bf9248e7058a8160129969e81b6d9d37
SHA1 hash:
8c37ad8f2cf16902ea4b7e874233055973b1246d
SH256 hash:
a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
MD5 hash:
4ff75f505fddcc6a9ae62216446205d9
SHA1 hash:
efe32d504ce72f32e92dcf01aa2752b04d81a342
SH256 hash:
4dc09bac0613590f1fac8771d18af5be25a1e1cb8fdbf4031aa364f3057e74a2
MD5 hash:
0ee914c6f0bb93996c75941e1ad629c6
SHA1 hash:
12e2cb05506ee3e82046c41510f39a258a5e5549
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
3ef32e0152cc3fa07c417e6aadf9ead83a17b5fdee73799044e1bd7564725d6e
MD5 hash:
f28eb5cbc3ca6d8c787f09f047d1f9c8
SHA1 hash:
70db1fac822974bc9b636a984bcc1da2e67f8de5
SH256 hash:
6ea525bface5467c1045c3708f339a4b92a3a273f70656e061c7f7322c56d667
MD5 hash:
1b02577f0addea32eb02a50d4a4cdd1e
SHA1 hash:
36f701ccec78a5d218fea23fd05351890f14cf7d
SH256 hash:
7d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
MD5 hash:
81e5c8596a7e4e98117f5c5143293020
SHA1 hash:
45b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SH256 hash:
96d04cdfaf4f4d7b8722b139a15074975d4c244302f78034b7be65df1a92fd03
MD5 hash:
3b180da2b50b954a55fe37afba58d428
SHA1 hash:
c2a409311853ad4608418e790621f04155e55000
SH256 hash:
baeb2f7c1b8be56738d34e1d1ddf8e0eebd3a633215dc1575e14656be38b939d
MD5 hash:
7b156d230278b8c914ef3f4169fec1cc
SHA1 hash:
6b58e20b2538cb308091da838710f6aad933a301
SH256 hash:
de83c9d9203050b40c098e4143ef8f577aa90016c7a64d4f2931b57a4c43e566
MD5 hash:
c89e401800de62e5702e085d898eed20
SHA1 hash:
72fb4f088c6ac02097b55fb267c76fbf5e0fa1f7
SH256 hash:
e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
MD5 hash:
4be7661c89897eaa9b28dae290c3922f
SHA1 hash:
4c9d25195093fea7c139167f0c5a40e13f3000f2
SH256 hash:
6a3625eb52aa5a3be2aa7992f8cc58ad5027fe8f382ddf034d31cb4b12754a53
MD5 hash:
aa3fe792621add6ff5b63f416e7b212f
SHA1 hash:
a2bab36a927dbdeb3253fe01a8f16be5143553a5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_detect_tls_callbacks
Rule name:ScanStringsInsocks5systemz
Author:Byambaa@pubcert.mn
Description:Scans presence of the found strings using the in-house brute force method
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessA
advapi32.dll::OpenProcessToken
kernel32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::GetSystemInfo
kernel32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryA
kernel32.dll::CreateFileA
kernel32.dll::DeleteFileA
kernel32.dll::GetWindowsDirectoryA
kernel32.dll::GetFileAttributesA
kernel32.dll::RemoveDirectoryA
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExA
advapi32.dll::RegQueryValueExA
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageA
user32.dll::CreateWindowExA

Comments