MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 807da5350698e0ddb7dc606ec590d5dcdb3ca395d0112ce5495c8c0d4da124e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Socks5Systemz
Vendor detections: 11
| SHA256 hash: | 807da5350698e0ddb7dc606ec590d5dcdb3ca395d0112ce5495c8c0d4da124e2 |
|---|---|
| SHA3-384 hash: | 00150ea9f115ca2aee131e2ac9c94629dd5f7a2ad51f32ab6325ba3f3ef32a6997ae62e1dfd9a793dc3efa4127cf09cd |
| SHA1 hash: | c8f848dcc0c5cec8f474c118d682e726de6a2010 |
| MD5 hash: | 84d15462fa3d7d3a2dbfb7faf8663ee0 |
| humanhash: | solar-echo-tango-sad |
| File name: | SecuriteInfo.com.Win32.Evo-gen.29488.25656 |
| Download: | download sample |
| Signature | Socks5Systemz |
| File size: | 7'399'899 bytes |
| First seen: | 2023-12-16 02:22:12 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'456 x Socks5Systemz, 262 x RaccoonStealer) |
| ssdeep | 196608:nu7AFQfzbJh1ObY4c2hqxGQzG1ad0sqnmh6tjVG4mzj:7Fcth1ObbcNxfG/txxmzj |
| Threatray | 5'490 similar samples on MalwareBazaar |
| TLSH | T10F763323C495A47DC4D24ABC2B42CE42EB6F6B945F5D205428DE27EC19BA2DC542F38F |
| TrID | 76.2% (.EXE) Inno Setup installer (107240/4/30) 10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4) 4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.2% (.EXE) Win32 Executable (generic) (4505/5/1) 1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| File icon (PE): | |
| dhash icon | fc66d8c8ead8b0b4 (212 x Socks5Systemz) |
| Reporter | |
| Tags: | exe Socks5Systemz |
Intelligence
File Origin
# of uploads :
1
# of downloads :
270
Origin country :
FRVendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Searching for synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching a process
Modifying a system file
Creating a file
Creating a service
Launching the process to interact with network services
Sending a custom TCP request
Enabling autorun for a service
Gathering data
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
control installer lolbin overlay packed shell32
Verdict:
Malicious
Labled as:
HEUR/AGEN.1332570
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Petite Virus, Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Petite Virus
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
Score:
26%
Verdict:
Benign
File Type:
PE
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-16 02:23:12 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
10 of 23 (43.48%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 5'480 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
discovery
Behaviour
Runs net.exe
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Unpacked files
SH256 hash:
7e91aff862a2e050bc7c2e6346f7dfd12e7c9d4c982d571a3549dcdbe5cbc356
MD5 hash:
ec6cbe3f3ffae7f4445aa6e7fd11ba5f
SHA1 hash:
df9ebcd1b9b6ec1e9e40dda746ab26c5a4535558
Detections:
INDICATOR_EXE_Packed_VMProtect
Parent samples :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 hash:
fa6807655b4473a46b325b33f2df65338fe7b1d0d851d1a4b3b24075c9599a0b
MD5 hash:
39d183d0a80faf6c8851ece09f60432b
SHA1 hash:
9b646c03372b8ead74185c3b7103e48ddfc1d272
SH256 hash:
dcfaf8c6df573d12223e0fdfa31bb04cc95e722dc9de0d69a58492ba2d136f22
MD5 hash:
fd11d417ad04c2200e71384ba0d34bae
SHA1 hash:
91e01f483179158b8ceac96d30b620ca79d0adfd
SH256 hash:
8d12748b790e59072977e3e7015ca4ebe0d9ea8c45293d8dcec7b76929163092
MD5 hash:
16a463f51788d0edfe043430d196e031
SHA1 hash:
247aa52a47abf8ee0dad19c702f8a546670f800e
SH256 hash:
887a894bf7caf70439c6f4409d179c5f6806cdd227b357175c759448479b9844
MD5 hash:
f0f9b76a88b09a0e72fd2379b1650429
SHA1 hash:
1145a219af2fbe2f7d37b007dd8639408615b4bd
SH256 hash:
807da5350698e0ddb7dc606ec590d5dcdb3ca395d0112ce5495c8c0d4da124e2
MD5 hash:
84d15462fa3d7d3a2dbfb7faf8663ee0
SHA1 hash:
c8f848dcc0c5cec8f474c118d682e726de6a2010
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.