MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 adcde787a75fa1df4c1e1abf54c13cbfaf014f6b910c074bfae4576a900834d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Socks5Systemz
Vendor detections: 14
| SHA256 hash: | adcde787a75fa1df4c1e1abf54c13cbfaf014f6b910c074bfae4576a900834d2 |
|---|---|
| SHA3-384 hash: | 6834806dc8c1439d319fcf39c29819b3477947ce4c3b6cd250b3df6d090e990c911a403a070c719a5b541a69b14086ed |
| SHA1 hash: | c3fa7d3cf9bb9032ed059cf2136a9d5252fcd6e7 |
| MD5 hash: | 0222fc9efea5f01d8f72d5c965439343 |
| humanhash: | massachusetts-triple-hawaii-high |
| File name: | 0222fc9efea5f01d8f72d5c965439343.exe |
| Download: | download sample |
| Signature | Socks5Systemz |
| File size: | 3'992'076 bytes |
| First seen: | 2024-07-31 14:40:17 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'454 x Socks5Systemz, 262 x RaccoonStealer) |
| ssdeep | 98304:NwXPo8NYQr4+mODihX7X+LFzY5Pmg/7oAApCdF9:wqQKO6L+FzAjxApC39 |
| Threatray | 127 similar samples on MalwareBazaar |
| TLSH | T1120633091CE598B8E10290B96911F224BBF7BF82AAF8307931DC491E4FB7B35561F6D1 |
| TrID | 76.2% (.EXE) Inno Setup installer (107240/4/30) 10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4) 4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| File icon (PE): | |
| dhash icon | b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer) |
| Reporter | |
| Tags: | exe Socks5Systemz |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 185.196.8.214:80 | https://threatfox.abuse.ch/ioc/1305426/ |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
2c90d977b28730793bf9d6be7873b8d8ba7f55194737da0dd282e388740e9475
e609e82d949e7d651a97dc59c7e3c9c32bc1e2ba51dc2c3cd474f75af40e69e0
c131cb51cf9ad72483df8504488433a085302cdbb10d4d5e1d89bbdb748bb12a
35c1dd0c091271adcb8ebee5db2be736f14e48afdb05076191f6160cc020f614
adcde787a75fa1df4c1e1abf54c13cbfaf014f6b910c074bfae4576a900834d2
df2a73d62d5706ab059daf98d8e97e682287bd915ec0ca5fd1760171b9869a51
9016f29156d47c3b546d2c3591462cadeda43202e6b3a313b1977ca17bc8f244
9364698aabc3bc3b4882baa2a468dbded4663fb172a39e9a87641d0321f05c96
5f368a7a339e485c3795a21bea867e9ea0606c3c66f7ca3c3b4a644a70d05228
a51b75ef6b4fb020c834b8d1b58c11de532ee6171ea94a645f5986630332de26
d072eaf6f16761ed0abb1f73d5e79225fdae23824fb9ac618d12788346f4982b
ae8c02bd39bf583e222817248160a8833283074da48e7f8eb06cbeecdfac93cd
e5944b44826c7b49a04bae11af1a239f57e4182d6c8608ec0771a820b34e62fd
905f63ef50d49f0056a99b6e0b3372c4c916a84ed012fccbec9f78a52e67db3c
2abebde55df0658c2dbb2ee13a77888a79182bacece7d2e4f3a6b7fc5637d2b0
e6494ea4ce0cf998f2239eb261514eb1d7c83c5a793dda9d2835b894b6c85898
ca843fae772e643b3f075e7dea42d8a421b90c26b9231a8a3042d38d126c350e
171e930a212458e875dac9af2f01b9c080fc3147c7596870e543bc7c7fa6f8a5
c3c4e83c24b66eb5dd53bce4b13d62da7197e37bb67e4bd39b548f2f788c2c84
460532bce77c6d0fd1657631baca226960cef5edd840b9f79c149b0a072b33b4
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| SECURITY_BASE_API | Uses Security Base API | advapi32.dll::AdjustTokenPrivileges |
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::CreateProcessA advapi32.dll::OpenProcessToken kernel32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | kernel32.dll::LoadLibraryA kernel32.dll::GetSystemInfo kernel32.dll::GetCommandLineA |
| WIN_BASE_IO_API | Can Create Files | kernel32.dll::CreateDirectoryA kernel32.dll::CreateFileA kernel32.dll::DeleteFileA kernel32.dll::GetWindowsDirectoryA kernel32.dll::GetFileAttributesA kernel32.dll::RemoveDirectoryA |
| WIN_BASE_USER_API | Retrieves Account Information | advapi32.dll::LookupPrivilegeValueA |
| WIN_REG_API | Can Manipulate Windows Registry | advapi32.dll::RegOpenKeyExA advapi32.dll::RegQueryValueExA |
| WIN_USER_API | Performs GUI Actions | user32.dll::PeekMessageA user32.dll::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.