MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b71c926b6979fa4fa78e654f61d0dfed4ee2f3d9ca4d539657deb654436e7b71. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments 1

SHA256 hash: b71c926b6979fa4fa78e654f61d0dfed4ee2f3d9ca4d539657deb654436e7b71
SHA3-384 hash: 3cf495b1ace80bf53b202593b77fca17359b08a731c646b412a7a2ece3ba35bf99b6891a460728ee4bdfed28304455a1
SHA1 hash: 57ea85cc5376bce07ef81b754b0421054eca91c0
MD5 hash: f1963893f87714468f02a81752b8d858
humanhash: winter-magnesium-shade-four
File name:f1963893f87714468f02a81752b8d858
Download: download sample
Signature Socks5Systemz
File size:7'646'617 bytes
First seen:2024-02-02 12:37:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'512 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 196608:iReymo0w/KxWAwesAEswsO28u0a9kG33dtXmOj0Nwb0ef:Imo0SKFwHuwsOs0eXXwq0ef
Threatray 80 similar samples on MalwareBazaar
TLSH T17776331130A368F6E959FF7C6E72462C92313AA35D09448CD2BB7E881F7A544D06E3B9
TrID 76.2% (.EXE) Inno Setup installer (107240/4/30)
10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe Socks5Systemz

Intelligence


File Origin
# of uploads :
1
# of downloads :
292
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
fingerprint installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1385576 Sample: klWXf2XogF.exe Startdate: 02/02/2024 Architecture: WINDOWS Score: 100 43 time.windows.com 2->43 49 Snort IDS alert for network traffic 2->49 51 Found malware configuration 2->51 53 Antivirus / Scanner detection for submitted sample 2->53 55 7 other signatures 2->55 8 klWXf2XogF.exe 2 2->8         started        11 svchost.exe 2->11         started        14 svchost.exe 2->14         started        16 5 other processes 2->16 signatures3 process4 file5 39 C:\Users\user\AppData\...\klWXf2XogF.tmp, PE32 8->39 dropped 18 klWXf2XogF.tmp 21 27 8->18         started        57 Changes security center settings (notifications, updates, antivirus, firewall) 11->57 21 MpCmdRun.exe 2 11->21         started        signatures6 process7 file8 31 C:\Users\user\AppData\...\zlib1.dll (copy), PE32 18->31 dropped 33 C:\Users\user\AppData\...\xdrdocviewer.exe, PE32 18->33 dropped 35 C:\Users\user\AppData\...\unins000.exe (copy), PE32 18->35 dropped 37 31 other files (28 malicious) 18->37 dropped 23 xdrdocviewer.exe 1 17 18->23         started        26 xdrdocviewer.exe 1 2 18->26         started        29 conhost.exe 21->29         started        process9 dnsIp10 45 boeojwu.com 185.196.8.22, 49710, 49712, 49714 SIMPLECARRER2IT Switzerland 23->45 47 142.132.202.219, 2023, 49711, 49713 UNIVERSITYOFWINNIPEG-ASNCA Canada 23->47 41 C:\...\DeliveryStatusFields_66.exe, PE32 26->41 dropped file11
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2024-02-02 12:30:02 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
socks5systemz
Score:
  10/10
Tags:
family:socks5systemz botnet discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Detect Socks5Systemz Payload
Socks5Systemz
Unpacked files
SH256 hash:
7a65a40983737798ed3090d40418588af5a6e9d1a0506b87cb8ee82aba0b5ff6
MD5 hash:
a0a4b1b01a86d2412056ddf332aacf96
SHA1 hash:
daeabeacaf9a38dc5c1236fac0636959283a8fba
SH256 hash:
ec217dc96761acb2d853b13c0dc4690a10f7f12fcc8eb343b4b15ef7d4c51bd9
MD5 hash:
90d5aac16ea69d9615bd3cba9f33ff47
SHA1 hash:
b20fc830bb63eb8109a6666c7bb8d0dc2c9aa4f8
Detections:
INDICATOR_EXE_Packed_VMProtect
SH256 hash:
15c8ef08aab2e0346f332e5f96f0f0ecc0dbcd59e240571ef96032e473364598
MD5 hash:
cca8bd2432030c51b5dfdd5d9b5da9d8
SHA1 hash:
2913ca28fb6a546794c588ef4ab9e1beebdadb73
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
4dc09bac0613590f1fac8771d18af5be25a1e1cb8fdbf4031aa364f3057e74a2
MD5 hash:
0ee914c6f0bb93996c75941e1ad629c6
SHA1 hash:
12e2cb05506ee3e82046c41510f39a258a5e5549
SH256 hash:
29ed645b31d3e296453fb53b2217df7920a9d6cf3cdb8ac5d87a3b58fd01ebb1
MD5 hash:
1c5ec7267a051ba53b8ee91b5c5cd7d1
SHA1 hash:
5bb87291e46b0186092936cb01d8574463947610
SH256 hash:
b71c926b6979fa4fa78e654f61d0dfed4ee2f3d9ca4d539657deb654436e7b71
MD5 hash:
f1963893f87714468f02a81752b8d858
SHA1 hash:
57ea85cc5376bce07ef81b754b0421054eca91c0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Socks5Systemz

Executable exe b71c926b6979fa4fa78e654f61d0dfed4ee2f3d9ca4d539657deb654436e7b71

(this sample)

Comments



Avatar
zbet commented on 2024-02-02 12:37:26 UTC

url : hxxp://mix.avalmag.com/data/pdf/june.exe