MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 dc6c2f9d57aee159b5c6453b56c93fa6976f83a3685b388aff968e5dfe498841. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Socks5Systemz
Vendor detections: 17
| SHA256 hash: | dc6c2f9d57aee159b5c6453b56c93fa6976f83a3685b388aff968e5dfe498841 |
|---|---|
| SHA3-384 hash: | 54672dc5dc769fa3068ac0abf8da99846f4925ffb77afdd58c8f65a9f115474c6c15c1efcaaf0ef25ec04a154c122d14 |
| SHA1 hash: | 2a7dd87f781df6fdaa1b17695d93ee9accf36d1c |
| MD5 hash: | c61f76c54ce0f89894ef870a48c5497c |
| humanhash: | fifteen-asparagus-happy-shade |
| File name: | c61f76c54ce0f89894ef870a48c5497c.exe |
| Download: | download sample |
| Signature | Socks5Systemz |
| File size: | 243'712 bytes |
| First seen: | 2024-10-12 21:25:14 UTC |
| Last seen: | 2024-10-12 22:35:15 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 636068238a0ab0df9c8e341eee8428d0 (2 x Socks5Systemz, 1 x Smoke Loader) |
| ssdeep | 3072:2mIRlVcRxMiSBufsq53/Q+CoNnHgCFBxqXYUGrG:27yzQus+FJHhqI |
| Threatray | 2'383 similar samples on MalwareBazaar |
| TLSH | T1A63429316EF17C14F6B3CA31CE3996E4EB2FB8D29D24225D21E45A0F09F11A1E56B712 |
| TrID | 46.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 25.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 8.5% (.EXE) Win64 Executable (generic) (10522/11/4) 5.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.0% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 12716c4cf4c4d4c4 (6 x Stealc, 3 x Socks5Systemz, 1 x Smoke Loader) |
| Reporter | |
| Tags: | exe Socks5Systemz |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://77.83.175.72/95889e9cbe70f401.php | https://threatfox.abuse.ch/ioc/1335908/ |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Detect_Malicious_VBScript_Base64 |
|---|---|
| Author: | daniyyell |
| Description: | Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::DeleteVolumeMountPointA KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::ReadConsoleOutputW KERNEL32.dll::ReadConsoleA KERNEL32.dll::SetConsoleMode KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleAliasExesLengthA KERNEL32.dll::GetConsoleAliasesLengthA KERNEL32.dll::GetConsoleWindow |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::MoveFileW KERNEL32.dll::GetFileAttributesA |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW KERNEL32.dll::QueryDosDeviceW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.