MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 788477c79faa2ed3b28f7232f1114b94d513dd643f4d0bcc0441d77a1eab4058. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SystemBC


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 788477c79faa2ed3b28f7232f1114b94d513dd643f4d0bcc0441d77a1eab4058
SHA3-384 hash: 397e1e0047c2be35d08cbccc5b5a2b6279a7b1125548d3b90c7159af23bd1a9d9bec65d7dc8894058f025a63e3e675e1
SHA1 hash: 733939cb4a05bec0d2017024f6256e05d17cf904
MD5 hash: 0c9406ae7b6215874ab0694dc795da3e
humanhash: mars-fanta-skylark-finch
File name:0c9406ae7b6215874ab0694dc795da3e.exe
Download: download sample
Signature SystemBC
File size:7'847'424 bytes
First seen:2023-02-08 18:26:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 24d29255658d65fd08ba9d0a6637209b (1 x SystemBC)
ssdeep 196608:ACvO+CId6GWCQS15dK+OvSqYYz3Kf4PalECQZHpzRkNLMDkDY:V6i/O6qPG3lfSHuns
TLSH T1BA86238D058A51F4D5CC1234912BFEDB33F25EAA4D918C2EBEC5788E6572F66E036483
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.5% (.EXE) Win32 Executable (generic) (4505/5/1)
8.4% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:exe SystemBC

Intelligence


File Origin
# of uploads :
1
# of downloads :
179
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0c9406ae7b6215874ab0694dc795da3e.exe
Verdict:
No threats detected
Analysis date:
2023-02-08 18:27:59 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Connecting to a non-recommended domain
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Detected VMProtect packer
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Systembc
Status:
Suspicious
First seen:
2023-02-06 06:49:51 UTC
File Type:
PE (Exe)
AV detection:
15 of 39 (38.46%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
systembc
Score:
  10/10
Tags:
family:systembc trojan vmprotect
Behaviour
VMProtect packed file
SystemBC
Malware Config
C2 Extraction:
mininglivepools.com:4246
myprettysocks.com:4246
Unpacked files
SH256 hash:
788477c79faa2ed3b28f7232f1114b94d513dd643f4d0bcc0441d77a1eab4058
MD5 hash:
0c9406ae7b6215874ab0694dc795da3e
SHA1 hash:
733939cb4a05bec0d2017024f6256e05d17cf904
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments