MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1d6351e41826f72ff10e05e8f888114afeb9fdb4f14da96505ae647da0587ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: e1d6351e41826f72ff10e05e8f888114afeb9fdb4f14da96505ae647da0587ff
SHA3-384 hash: 133df8199fc9b04765d2345fbf8a9a53fcaec649933564e249dd87f5666f0402ebbba4a8fa3e61229126163ef97e72cf
SHA1 hash: 982cd470e8626f53e2b1a2b203d55679933aea5d
MD5 hash: e1534429737b3ce7fb60a690024a3163
humanhash: seven-seventeen-blossom-aspen
File name:SecuriteInfo.com.Win32.Malware-gen.24677.4029
Download: download sample
Signature Socks5Systemz
File size:2'881'599 bytes
First seen:2023-11-23 21:18:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'509 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 49152:72YwvLbBL8IQbDbq6hhFiucmUHq2uK3njQJJmgBkVrAhUQCe4f4/fzdedvQRY0E:SfvXBLk42UHuK3jWXWKOe4fWdmQlE
Threatray 41 similar samples on MalwareBazaar
TLSH T1DDD5338BA582E9F6E03B99700D246EBE49EBB9D6747A941C3CEEA44D1F73116100F374
TrID 76.6% (.EXE) Inno Setup installer (109740/4/30)
9.9% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.1% (.EXE) Win32 Executable (generic) (4505/5/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:exe Socks5Systemz

Intelligence


File Origin
# of uploads :
1
# of downloads :
343
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Creating a file
Moving a recently created file
Launching a process
Modifying a system file
Creating a service
Launching the process to interact with network services
Enabling autorun for a service
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control greyware installer lolbin masquerade overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1347113 Sample: SecuriteInfo.com.Win32.Malw... Startdate: 23/11/2023 Architecture: WINDOWS Score: 100 47 Snort IDS alert for network traffic 2->47 49 Antivirus / Scanner detection for submitted sample 2->49 51 Multi AV Scanner detection for dropped file 2->51 53 7 other signatures 2->53 8 SecuriteInfo.com.Win32.Malware-gen.24677.4029.exe 2 2->8         started        process3 file4 33 SecuriteInfo.com.W...-gen.24677.4029.tmp, PE32 8->33 dropped 11 SecuriteInfo.com.Win32.Malware-gen.24677.4029.tmp 18 27 8->11         started        process5 file6 35 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 11->35 dropped 37 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 11->37 dropped 39 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 11->39 dropped 41 13 other files (12 malicious) 11->41 dropped 55 Uses schtasks.exe or at.exe to add and modify task schedules 11->55 15 AVILine.exe 1 15 11->15         started        18 AVILine.exe 1 3 11->18         started        21 net.exe 1 11->21         started        23 schtasks.exe 1 11->23         started        signatures7 process8 dnsIp9 43 ceihgff.net 185.141.63.253, 49712, 49716, 49717 BELCLOUDBG Bulgaria 15->43 45 88.80.147.36, 1074, 49713, 49715 BELCLOUDBG Bulgaria 15->45 31 C:\ProgramData\SVGAHelper\SVGAHelper.exe, PE32 18->31 dropped 25 conhost.exe 21->25         started        27 net1.exe 1 21->27         started        29 conhost.exe 23->29         started        file10 process11
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-11-23 21:19:07 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
15 of 23 (65.22%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Runs net.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Unpacked files
SH256 hash:
8ca0583b438afefd980b96d327e12df2cdd1e0f153420621731514e99f457174
MD5 hash:
2a58104953a15e5d259f916d1a052d67
SHA1 hash:
be88b3746cc9ec3ec863d1dd65543cbbcd67d197
SH256 hash:
e230a08c98e0593904dfc5c82b94a58e812d6d3174626cda4010e90339d5b7ff
MD5 hash:
dde9c806678228d3a450658ef2956da7
SHA1 hash:
a4f82691fefda33030d437d012c2aa2d5c3d85d5
SH256 hash:
3243325f753037f9ff00a12ddda546740f20a4465c2a046b15618ac6477ce99c
MD5 hash:
6cd597c18dcb262459307b42649d4f18
SHA1 hash:
94461e99edf268a664643749bbf3bb82e702fc87
SH256 hash:
4f0571e069f256296069efd02dba43c6671db52b0ee5c987411e93ebe8596aa3
MD5 hash:
7878d56733b3adf612ad041399d8c078
SHA1 hash:
8b29966c555271e50b8d934f4070e3544811012f
SH256 hash:
e4bbb51a84054d416d1b2c8e70b42259458c24b7d202509f42960260f204a4fe
MD5 hash:
82ab6f3e60004c71abe6082525f2670f
SHA1 hash:
53a1789077cba17fce1488e224ea4120defa3960
SH256 hash:
e1d6351e41826f72ff10e05e8f888114afeb9fdb4f14da96505ae647da0587ff
MD5 hash:
e1534429737b3ce7fb60a690024a3163
SHA1 hash:
982cd470e8626f53e2b1a2b203d55679933aea5d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments