MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8bb8ddf4bc1f6d8a8fecadcf6d2ad208c6429092f52cddcd5db77307cdef1de0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 8bb8ddf4bc1f6d8a8fecadcf6d2ad208c6429092f52cddcd5db77307cdef1de0
SHA3-384 hash: 584bb5992917036f4d4740ae90f3653bc5d23da31ee2d6f5459d27455f4c404a03fb560f30543c61072f4621348ab132
SHA1 hash: 6b2a56abcd215a45f7950b90d9690c76215ee0fa
MD5 hash: f0da757ea2402ae8e85dd7a68e77405d
humanhash: hot-nineteen-freddie-failed
File name:SecuriteInfo.com.Trojan.Siggen22.40888.31002.9976
Download: download sample
Signature Socks5Systemz
File size:6'755'423 bytes
First seen:2023-12-18 04:20:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'463 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 98304:/oP7AnGPoDtmRRSVeH5Y5iiKb43obOZjhu5JLMIqYoQxQ+n9mwCrTPSPmA:u50DEb43OH5dtqYxvItrTaPF
Threatray 6'306 similar samples on MalwareBazaar
TLSH T1B566335392454DB9F074A97CAC5BE9200BA7B3C2269F21E073CC7D75AF1B6EA14272C4
TrID 76.2% (.EXE) Inno Setup installer (107240/4/30)
10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:exe Socks5Systemz

Intelligence


File Origin
# of uploads :
1
# of downloads :
303
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Searching for synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching the process to interact with network services
Modifying a system file
Creating a file
Creating a service
Launching a process
Enabling autorun for a service
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control installer lolbin masquerade overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Petite Virus, Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of debugger detection
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Snort IDS alert for network traffic
Yara detected Petite Virus
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1363739 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 18/12/2023 Architecture: WINDOWS Score: 100 40 Snort IDS alert for network traffic 2->40 42 Antivirus / Scanner detection for submitted sample 2->42 44 Multi AV Scanner detection for dropped file 2->44 46 8 other signatures 2->46 8 SecuriteInfo.com.Trojan.Siggen22.40888.31002.9976.exe 2 2->8         started        process3 file4 28 SecuriteInfo.com.T...0888.31002.9976.tmp, PE32 8->28 dropped 11 SecuriteInfo.com.Trojan.Siggen22.40888.31002.9976.tmp 17 71 8->11         started        process5 file6 30 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 11->30 dropped 32 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 11->32 dropped 34 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 11->34 dropped 36 99 other files (5 malicious) 11->36 dropped 14 kphonelib.exe 1 15 11->14         started        17 kphonelib.exe 1 2 11->17         started        20 net.exe 1 11->20         started        process7 dnsIp8 38 bdsurqm.com 185.196.8.22, 49712, 49713, 49715 SIMPLECARRER2IT Switzerland 14->38 26 C:\ProgramData2674Bitscore2674Bitscore.exe, PE32 17->26 dropped 22 conhost.exe 20->22         started        24 net1.exe 1 20->24         started        file9 process10
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-18 04:22:06 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
17 of 23 (73.91%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Runs net.exe
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Unpacked files
SH256 hash:
32de45dd111ca3d5db870d89691156cd02d883b6fbc0bf34976a7a18d22c3693
MD5 hash:
198c74c1b9c9365ddba6a682170c7b50
SHA1 hash:
f9e41f189b1cb07887939410086c736ed99c4f5b
SH256 hash:
c2d1be4b4ff89deafd1cad22c5ad9991039e7daa82f9fa60c7b2314b0235e051
MD5 hash:
35a0fed43ab1181bc232ec842c6b5015
SHA1 hash:
04c12273ac1e91da6ec3282050e2733376c59cec
Detections:
INDICATOR_EXE_Packed_VMProtect
SH256 hash:
048a7edfc7efe670736c692b1048d30bb6732c59eada1df65eda794e47ac7709
MD5 hash:
a2de770c0fc56c776075b45c77da0c4d
SHA1 hash:
6fe3e0098e2069df58bc821ddafda7826725109b
SH256 hash:
434baaf40249bc4731be05b0842226fb2e7846b812e006f6a00a43bb1f7ecbf8
MD5 hash:
eb9ff059374c001bf7ebb0990aa98e1b
SHA1 hash:
0a247f9f34cfbb6811cb0c767cd284ca2a088332
SH256 hash:
8bb8ddf4bc1f6d8a8fecadcf6d2ad208c6429092f52cddcd5db77307cdef1de0
MD5 hash:
f0da757ea2402ae8e85dd7a68e77405d
SHA1 hash:
6b2a56abcd215a45f7950b90d9690c76215ee0fa
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments