MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bbf513305c61fc5e26cbbe5a72931b5bc0feeb0d834a85edf99b5bf5a853feb4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SystemBC


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: bbf513305c61fc5e26cbbe5a72931b5bc0feeb0d834a85edf99b5bf5a853feb4
SHA3-384 hash: fb2ac759a25f0f145fb91c6f2fb85a476f9676b1dace9b0c63a11479a9c5d2820ac79f566b40f45bebc85a562329c5e9
SHA1 hash: 0df44a8b7424787e6847435d39b42efd955020f6
MD5 hash: b97c5fb8ffe52136069acd188303d3c4
humanhash: west-oscar-lima-louisiana
File name:file
Download: download sample
Signature SystemBC
File size:1'624'064 bytes
First seen:2026-02-16 20:30:23 UTC
Last seen:2026-02-16 21:15:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:xj8nlatbgR5gXH7lIk8ELqt69SQ5RTt9:xj80Ri5yHT5LW69SqTT
TLSH T176753370FE0B26B9E0B801F8E02B695BFF251A179BCC6C64050D90D3AAE77B5A3D5D50
TrID 28.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
25.5% (.EXE) Win32 Executable (generic) (4504/4/1)
11.6% (.ICL) Windows Icons Library (generic) (2059/9)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe fbf543 SystemBC


Avatar
Bitsight
url: http://130.12.180.43/files/748049926/ka0OL2S.exe

Intelligence


File Origin
# of uploads :
12
# of downloads :
217
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
systembc
ID:
1
File name:
_bbf513305c61fc5e26cbbe5a72931b5bc0feeb0d834a85edf99b5bf5a853feb4.exe
Verdict:
Malicious activity
Analysis date:
2026-02-16 20:31:31 UTC
Tags:
tas17 themida systembc proxyware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
vmdetect autorun
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm anti-vm crypt evasive fingerprint masm obfuscated packed packed themidawinlicense
Verdict:
Malicious
File Type:
exe x32
Detections:
HEUR:Trojan-Ransom.Win32.Encoder.gen HEUR:Trojan.Win32.Generic Trojan-Proxy.Win32.Sybici.sb Trojan.Win64.Agent.sb
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Infostealer.Tinba
Status:
Malicious
First seen:
2026-02-16 20:31:39 UTC
File Type:
PE (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
systembc
Score:
  10/10
Tags:
family:systembc defense_evasion discovery trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks BIOS information in registry
Executes dropped EXE
Identifies Wine through registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
SystemBC
Systembc family
Malware Config
C2 Extraction:
headwindvariable.cc
endlessgrumbler.cc
Unpacked files
SH256 hash:
bbf513305c61fc5e26cbbe5a72931b5bc0feeb0d834a85edf99b5bf5a853feb4
MD5 hash:
b97c5fb8ffe52136069acd188303d3c4
SHA1 hash:
0df44a8b7424787e6847435d39b42efd955020f6
SH256 hash:
d61d01c4146d618b7e22427887d287860173b0e73999ca7d8b16d45ba2fc84ac
MD5 hash:
3a7a19199899b5c6ebc8579c8843bb2d
SHA1 hash:
1d573d2a3f227b96a35f1cf7e44888d19ee8a8cf
Detections:
win_systembc_g1 SystemBC
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SystemBC

Executable exe bbf513305c61fc5e26cbbe5a72931b5bc0feeb0d834a85edf99b5bf5a853feb4

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments