MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 990edaa15e1079b642d834178a84a2c0ae450ba0451a9aa5893dc4681a75391b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SystemBC


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 990edaa15e1079b642d834178a84a2c0ae450ba0451a9aa5893dc4681a75391b
SHA3-384 hash: cbe62f8e1f401313985a524fd73ede2aa8f28979cf5e0be5d7a8c4f1fc51ac10d7f70569a3e9686516cbbee9e34e78e1
SHA1 hash: f7940234131ae53060484f62a4a0c17389a38f7b
MD5 hash: f6eb9deb2f5a20c6739a8049a2627ec6
humanhash: july-stream-cardinal-golf
File name:f6eb9deb2f5a20c6739a8049a2627ec6.exe
Download: download sample
Signature SystemBC
File size:236'544 bytes
First seen:2020-05-20 11:48:24 UTC
Last seen:2020-05-20 13:17:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 706efeeed3e31c69a9fe5fedb498c9e6 (1 x Heodo, 1 x SystemBC)
ssdeep 3072:shRe6S7xKqujrNxChikmflOOe2RWIiupNVQzC29ewRg9:sLe6S7xKq2h0hikmEOx0IDpCCYNR
Threatray 375 similar samples on MalwareBazaar
TLSH 3B347C11B3E1D831E3620B318D69D6E4263EB9325F3456BB33642B2F1E70DB08A67356
Reporter abuse_ch
Tags:exe SystemBC


Avatar
abuse_ch
SystemBC payload URL:
http://qemy.com/config.exe

SystemBC C2:
winstationsocks.xyz:4124 (185.203.119.235)

Intelligence


File Origin
# of uploads :
2
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kpot
Status:
Malicious
First seen:
2020-05-08 22:41:31 UTC
File Type:
PE (Exe)
Extracted files:
52
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Looks up external IP address via web service
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments