MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ecb32d8eeb45289949087c2a7e91b19847aea548c15457c089c0304a202ed9a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Socks5Systemz


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: ecb32d8eeb45289949087c2a7e91b19847aea548c15457c089c0304a202ed9a0
SHA3-384 hash: 89b314686db0a51eafb3ddfe29f9cccacb23a6203bb18093c7c782e927982b4ff2d05e6ce1bbb7443ecc0045cc5a50b4
SHA1 hash: d8f8b08f17582959a5849a4ffa8f6b20a7b5a4a7
MD5 hash: d6ed749ab84e39599f788efcc184d517
humanhash: twenty-speaker-apart-fillet
File name:tuc4.exe
Download: download sample
Signature Socks5Systemz
File size:7'849'305 bytes
First seen:2023-12-10 17:07:11 UTC
Last seen:2023-12-10 18:49:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'463 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 196608:D1WnE0mkLwfSuDOhMUQK2TMvYqBzQ26keWVe2JJpC+zj:xWnEELvuDOhtQnT+6rWPdC+zj
Threatray 154 similar samples on MalwareBazaar
TLSH T1918633043B6AD2FAC11AA7732AB757553623FDC80C31C9E99A9E9FDC0537A4D3988113
TrID 76.2% (.EXE) Inno Setup installer (107240/4/30)
10.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter Xev
Tags:exe Socks5Systemz


Avatar
NIXLovesCooper
Downloaded from http://never.hitsturbo.com/order/tuc4.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
263
Origin country :
GR GR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Searching for synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching a process
Modifying a system file
Creating a file
Creating a service
Sending a custom TCP request
Launching the process to interact with network services
Enabling autorun for a service
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Petite Virus, Socks5Systemz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of debugger detection
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Petite Virus
Yara detected Socks5Systemz
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1357488 Sample: tuc4.exe Startdate: 10/12/2023 Architecture: WINDOWS Score: 100 58 time.windows.com 2->58 62 Snort IDS alert for network traffic 2->62 64 Antivirus / Scanner detection for submitted sample 2->64 66 Detected unpacking (changes PE section rights) 2->66 68 6 other signatures 2->68 9 tuc4.exe 2 2->9         started        12 svchost.exe 2->12         started        15 svchost.exe 1 2->15         started        17 7 other processes 2->17 signatures3 process4 dnsIp5 52 C:\Users\user\AppData\Local\Temp\...\tuc4.tmp, PE32 9->52 dropped 20 tuc4.tmp 17 76 9->20         started        72 Changes security center settings (notifications, updates, antivirus, firewall) 12->72 24 MpCmdRun.exe 2 12->24         started        74 Query firmware table information (likely to detect VMs) 15->74 56 127.0.0.1 unknown unknown 17->56 file6 signatures7 process8 file9 44 C:\Program Files (x86)\...\voiceassist.exe, PE32 20->44 dropped 46 C:\Program Files (x86)\...\is-TUJT7.tmp, PE32 20->46 dropped 48 C:\Program Files (x86)\...\is-2OC41.tmp, PE32 20->48 dropped 50 56 other files (none is malicious) 20->50 dropped 70 Uses schtasks.exe or at.exe to add and modify task schedules 20->70 26 voiceassist.exe 1 15 20->26         started        29 net.exe 1 20->29         started        31 voiceassist.exe 1 2 20->31         started        34 schtasks.exe 1 20->34         started        36 conhost.exe 24->36         started        signatures10 process11 dnsIp12 60 bgxazeb.com 185.196.8.22, 49711, 49712, 49713 SIMPLECARRER2IT Switzerland 26->60 38 conhost.exe 29->38         started        40 net1.exe 1 29->40         started        54 C:\ProgramData\SAudioStore\SAudioStore.exe, PE32 31->54 dropped 42 conhost.exe 34->42         started        file13 process14
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Runs net.exe
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Unpacked files
SH256 hash:
8a262e26910227d80140f97ee078084cb166182fccd9c6fb5087d5bb1a65dccf
MD5 hash:
14a49b4b02900b3014bc7f60afa80e33
SHA1 hash:
ac2f5d9213ba61945d7f998c3715a3f855ed78a8
SH256 hash:
b8081f233a106c11a2307bfde58079d7ddbf49550085f57cde4b0a2749214f31
MD5 hash:
018a83fabe2bc476cdb62fb7b22e901a
SHA1 hash:
05ddb4f3c53613d4715d99bae5366ca41faf3059
SH256 hash:
323f555793af5bb8c5cae0e655fa2104c638c9bea480f52261ee2e0501476561
MD5 hash:
a4a65b014344fcce064412bc59ff6881
SHA1 hash:
9c35f49f2c6b11fe35d5428e5cef7cc4409b453c
SH256 hash:
cf0ab3f8d11548e879cb6ebcbadb61f7691f96dcaef19aac9bb3dcc20776f4be
MD5 hash:
33645f5434b44264b69ee02341ffc2fb
SHA1 hash:
3f85dd9d4dde8f3f9356b324b9b7569390a370c4
SH256 hash:
ecb32d8eeb45289949087c2a7e91b19847aea548c15457c089c0304a202ed9a0
MD5 hash:
d6ed749ab84e39599f788efcc184d517
SHA1 hash:
d8f8b08f17582959a5849a4ffa8f6b20a7b5a4a7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments