MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d134bebdf067cc8f99dac75e8b1c22c0f032d29c0baab49d0f8a4eef5304c5d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Socks5Systemz
Vendor detections: 15
| SHA256 hash: | d134bebdf067cc8f99dac75e8b1c22c0f032d29c0baab49d0f8a4eef5304c5d0 |
|---|---|
| SHA3-384 hash: | f5142bd4c6236c756d04830175a6eec7af8bb8e5b8b7a115abaf28bc63068d01a6ba0b981f10f0b715350bb55a375023 |
| SHA1 hash: | b27a8deb3c6a5373c80b210f318fa2521a6840f8 |
| MD5 hash: | d6bc7e1a8b5256f7d2c5d3d344b3bc7f |
| humanhash: | delta-pip-alpha-iowa |
| File name: | d6bc7e1a8b5256f7d2c5d3d344b3bc7f.exe |
| Download: | download sample |
| Signature | Socks5Systemz |
| File size: | 468'480 bytes |
| First seen: | 2024-10-09 16:50:13 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2f55e27b71ad52ab5e8947ebd770f2c7 (1 x Socks5Systemz, 1 x Stealc) |
| ssdeep | 6144:JIYGxzaff+ssRhLRCS0LTHhmd0ButsqpSrG/OHgLBs1891H71WeTTz3:t9evvJETBUYutxc6/WgG18v1W2f3 |
| Threatray | 2'620 similar samples on MalwareBazaar |
| TLSH | T140A4CF029199EE61F5FD463F8D1EE6E8A56DF812DF046B9733446A6F18302E2D27230D |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 0201030109033300 (1 x Socks5Systemz) |
| Reporter | |
| Tags: | exe Socks5Systemz |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://185.235.128.225/9272627cc026cb9e.php | https://threatfox.abuse.ch/ioc/1335194/ |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | win_samsam_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | autogenerated rule brought to you by yara-signator |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateProcessA KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetStartupInfoW KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetDiskFreeSpaceExA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::WriteConsoleA KERNEL32.dll::ReadConsoleInputW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleAliasExesW KERNEL32.dll::GetConsoleOutputCP KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileA KERNEL32.dll::CreateHardLinkW KERNEL32.dll::CreateFileA KERNEL32.dll::GetFileAttributesW KERNEL32.dll::GetTempPathA KERNEL32.dll::SetVolumeMountPointW KERNEL32.dll::SetVolumeMountPointA |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameA |
| WIN_HTTP_API | Uses HTTP services | WINHTTP.dll::WinHttpCheckPlatform WINHTTP.dll::WinHttpOpen |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.