MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 af04d97db0789ae6583eaa17aeda1bb8f5262167262d8e329cbe1e5791010817. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Socks5Systemz
Vendor detections: 12
| SHA256 hash: | af04d97db0789ae6583eaa17aeda1bb8f5262167262d8e329cbe1e5791010817 |
|---|---|
| SHA3-384 hash: | 90d34fb08b60816d8258262245de9c6929bf1e9c6b1ad25d859a2a6c51f588e3b8f06b562e50f749727ee9f8e1d4fb43 |
| SHA1 hash: | 90f24f51d7830db5d880fb2db844822fe4ecd0a0 |
| MD5 hash: | 302802b2b5512a5428a68d3906bdbe93 |
| humanhash: | robin-aspen-carpet-two |
| File name: | 302802b2b5512a5428a68d3906bdbe93.exe |
| Download: | download sample |
| Signature | Socks5Systemz |
| File size: | 5'203'661 bytes |
| First seen: | 2024-05-07 10:10:07 UTC |
| Last seen: | 2024-05-07 10:25:10 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'458 x Socks5Systemz, 262 x RaccoonStealer) |
| ssdeep | 98304:+1QLjkx3+qB7+uc7VAtXx1AuFBnskRko4YAnUMpqK7Cf4G/sstsQd1ZDlBx:msT32thPskREYAn0K7C//siXzx |
| Threatray | 3'432 similar samples on MalwareBazaar |
| TLSH | T1133633A3F05F9C79D38505359F6625347D37B45A2E38D01D7E2C9B2AAF3128A88CA7C1 |
| TrID | 76.2% (.EXE) Inno Setup installer (107240/4/30) 10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4) 4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| File icon (PE): | |
| dhash icon | b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer) |
| Reporter | |
| Tags: | exe Socks5Systemz |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://bwwrosd.com/search/?q=67e28dd83d0ef22d4407ad4d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978f371ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ffa11c7e9929833
http://bwwrosd.com/search/?q=67e28dd83d0ef22d4407ad4d7c27d78406abdd88be4b12eab517aa5c96bd86ec90824d885a8bbc896c58e713bc90c91d36b5281fc235a925ed3e50d6bd974a95129070b616e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee909a3ccb68941e
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_EXE_Packed_VMProtect |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with VMProtect. |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| SECURITY_BASE_API | Uses Security Base API | advapi32.dll::AdjustTokenPrivileges |
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::CreateProcessA advapi32.dll::OpenProcessToken kernel32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | kernel32.dll::LoadLibraryA kernel32.dll::GetSystemInfo kernel32.dll::GetCommandLineA |
| WIN_BASE_IO_API | Can Create Files | kernel32.dll::CreateDirectoryA kernel32.dll::CreateFileA kernel32.dll::DeleteFileA kernel32.dll::GetWindowsDirectoryA kernel32.dll::GetFileAttributesA kernel32.dll::RemoveDirectoryA |
| WIN_BASE_USER_API | Retrieves Account Information | advapi32.dll::LookupPrivilegeValueA |
| WIN_REG_API | Can Manipulate Windows Registry | advapi32.dll::RegOpenKeyExA advapi32.dll::RegQueryValueExA |
| WIN_USER_API | Performs GUI Actions | user32.dll::PeekMessageA user32.dll::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.