MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e79b1536ac9710a2fffc8bf4d3337e344aee2897d116dd48b9a4c4e174d49acf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 16


Intelligence 16 IOCs 1 YARA 3 File information Comments

SHA256 hash: e79b1536ac9710a2fffc8bf4d3337e344aee2897d116dd48b9a4c4e174d49acf
SHA3-384 hash: 319d10b9c7acbaa1fdc7019a8f98d01b34d4c442c15a6daab03eabd45a487072d68f1a02bbba0e17b4092f329cf26a67
SHA1 hash: 1e323c23b20007998b7c104a27cfd1b5c0f878f2
MD5 hash: 596116c65df4aa37c8018dc9acc4eb56
humanhash: summer-summer-floor-sodium
File name:596116C65DF4AA37C8018DC9ACC4EB56.exe
Download: download sample
Signature Socks5Systemz
File size:3'588'117 bytes
First seen:2024-07-31 14:30:19 UTC
Last seen:2024-07-31 15:33:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'463 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 98304:sjBf676DpowCfpV48epyfqhhYW/8ZEflpvEvCYjxlE:KfA6FowCfrMpyMR8ZEflaqYjxu
TLSH T10FF533872A84F0B2D81257318FF57C9EC63AF1BF8BA1564E0C6D98158B3A1D1643C76B
TrID 76.2% (.EXE) Inno Setup installer (107240/4/30)
10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 8010208841606862 (5 x Socks5Systemz)
Reporter abuse_ch
Tags:exe Socks5Systemz


Avatar
abuse_ch
Socks5Systemz C2:
185.196.8.214:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.196.8.214:80 https://threatfox.abuse.ch/ioc/1305426/

Intelligence


File Origin
# of uploads :
2
# of downloads :
368
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
596116C65DF4AA37C8018DC9ACC4EB56.exe
Verdict:
Malicious activity
Analysis date:
2024-07-31 14:30:41 UTC
Tags:
installer socks5systemz loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Execution Generic Network Static Stealth Trojan Heur
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Creating a file
Moving a recently created file
Launching a process
Modifying a system file
Creating a service
Launching the process to interact with network services
Enabling autorun for a service
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
borland_delphi fingerprint installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1485453 Sample: qn27KP0l9U.exe Startdate: 31/07/2024 Architecture: WINDOWS Score: 100 51 Found malware configuration 2->51 53 Antivirus / Scanner detection for submitted sample 2->53 55 Multi AV Scanner detection for dropped file 2->55 57 8 other signatures 2->57 8 qn27KP0l9U.exe 2 2->8         started        11 svchost.exe 2->11         started        process3 file4 37 C:\Users\user\AppData\...\qn27KP0l9U.tmp, PE32 8->37 dropped 13 qn27KP0l9U.tmp 18 27 8->13         started        process5 file6 39 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->39 dropped 41 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 13->41 dropped 43 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->43 dropped 45 20 other files (19 malicious) 13->45 dropped 59 Uses schtasks.exe or at.exe to add and modify task schedules 13->59 17 TVLand.exe 1 15 13->17         started        20 TVLand.exe 1 3 13->20         started        23 schtasks.exe 1 13->23         started        25 net.exe 1 13->25         started        signatures7 process8 dnsIp9 47 epfafez.ua 185.196.8.214, 49736, 49737, 49740 SIMPLECARRER2IT Switzerland 17->47 49 45.155.250.225, 1074, 49738, 49741 MEER-ASmeerfarbigGmbHCoKGDE Germany 17->49 35 C:\ProgramData\SVGARate\SVGARate.exe, PE32 20->35 dropped 27 conhost.exe 23->27         started        29 conhost.exe 23->29         started        31 conhost.exe 25->31         started        33 net1.exe 1 25->33         started        file10 process11
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-07-27 03:43:35 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
18 of 24 (75.00%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
socks5systemz
Score:
  10/10
Tags:
family:socks5systemz botnet discovery
Behaviour
Runs net.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Detect Socks5Systemz Payload
Socks5Systemz
Unpacked files
SH256 hash:
7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49
MD5 hash:
76436512e3e3a9dca38f5eaf312fe323
SHA1 hash:
503af6ad7617f847abbe509a907944f0e9213505
Detections:
Socks5Systemz
SH256 hash:
71087698cbc7e33502742da2c948bad53913e2169a93fd30fbf56805fc886e56
MD5 hash:
7e7d00f9ab35385b150b3eafbf48a7c7
SHA1 hash:
33c598ef84d839f33d5f60403ec2cc0a6242163c
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
4dc09bac0613590f1fac8771d18af5be25a1e1cb8fdbf4031aa364f3057e74a2
MD5 hash:
0ee914c6f0bb93996c75941e1ad629c6
SHA1 hash:
12e2cb05506ee3e82046c41510f39a258a5e5549
SH256 hash:
a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
MD5 hash:
4ff75f505fddcc6a9ae62216446205d9
SHA1 hash:
efe32d504ce72f32e92dcf01aa2752b04d81a342
SH256 hash:
c724c767c98742b9fa1cecb249b3adfb154e8cd3a8c24a8dcc09d5fab131dba4
MD5 hash:
bb104b85dbce15cb7548266d4e877505
SHA1 hash:
25e6d3dd307518d1c1e51f7be994230c8a22bb09
SH256 hash:
fcedda182a443ab9692c8f8439108483d169bc1881086b1ffa57aa8f1c818d0b
MD5 hash:
aae1b200d031719d01f97a50010f60c7
SHA1 hash:
20d078a7beda2be928fd6256f4004087e4919fa1
SH256 hash:
c7ce92123fa49cc88561ecb75c592407a983c86ba143051009edab07384ae10b
MD5 hash:
ba7dd0c1933eb85ef454c8badafc9264
SHA1 hash:
0d4ff5ff3eccdcffe1d75e3496ff34b01f4585dc
SH256 hash:
e79b1536ac9710a2fffc8bf4d3337e344aee2897d116dd48b9a4c4e174d49acf
MD5 hash:
596116c65df4aa37c8018dc9acc4eb56
SHA1 hash:
1e323c23b20007998b7c104a27cfd1b5c0f878f2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_detect_tls_callbacks
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessA
advapi32.dll::OpenProcessToken
kernel32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::GetSystemInfo
kernel32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryA
kernel32.dll::CreateFileA
kernel32.dll::DeleteFileA
kernel32.dll::GetWindowsDirectoryA
kernel32.dll::GetFileAttributesA
kernel32.dll::RemoveDirectoryA
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExA
advapi32.dll::RegQueryValueExA
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageA
user32.dll::CreateWindowExA

Comments