MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fe74f06d7437d213d96466b4475db2809c60a4e8aced9df338f4a71cf9bc7c16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SystemBC
Vendor detections: 14
| SHA256 hash: | fe74f06d7437d213d96466b4475db2809c60a4e8aced9df338f4a71cf9bc7c16 |
|---|---|
| SHA3-384 hash: | eac7c8d7e6e18421e880791ed62d06e4a2711b5770385102044897f7f1e671e1ea42dc0b6e116757b0db1cdc44fdbfe6 |
| SHA1 hash: | e8f25aa518b0ef54bcdf770479ef28dd99dd8efc |
| MD5 hash: | 96422a2b982c99614d31dff7f2b64680 |
| humanhash: | muppet-five-november-hamper |
| File name: | file |
| Download: | download sample |
| Signature | SystemBC |
| File size: | 4'714'496 bytes |
| First seen: | 2024-05-14 05:30:23 UTC |
| Last seen: | 2024-05-14 06:28:39 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'655 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger) |
| ssdeep | 24576:Epu+lTdASQBeSbtpO2+RZ8XK5OG/wS4gIVnxff9t+oQ9GXiqgbaaz2ub2UbRdL/h:EX |
| Threatray | 1'644 similar samples on MalwareBazaar |
| TLSH | T19F262AF4A09B85E1F8079DC069B8BED6067331B3CED90C20272D7A444FBA9597A4DD4E |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe SystemBC |
Bitsight
url: https://vk.com/doc5294803_669545092?hash=yX4D0AJlzvggJm6ZSbZ8oc2B360PWH6WjdSyT4F7oyP&dl=Xia0wtAs8auyEC7YhyGFVHiCCfp22U224MSO4OAqBIw&api=1&no_preview=1#tsIntelligence
File Origin
# of uploads :
2
# of downloads :
410
Origin country :
USVendor Threat Intelligence
Malware family:
systembc
ID:
1
File name:
fe74f06d7437d213d96466b4475db2809c60a4e8aced9df338f4a71cf9bc7c16.exe
Verdict:
Malicious activity
Analysis date:
2024-05-14 05:31:28 UTC
Tags:
botnet systembc proxy
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Gathering data
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a process with a hidden window
Creating a file in the %AppData% directory
Creating a file in the Windows subdirectories
Creating a file
Connection attempt
Launching a process
Creating a file in the system32 subdirectories
Forced system process termination
Setting browser functions hooks
Possible injection to a system process
Creating a file in the %temp% directory
Creating a process from a recently created file
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Using obfuscated Powershell scripts
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
SystemBC
Verdict:
Malicious
Result
Threat name:
PureLog Stealer, SystemBC
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious values (likely registry only malware)
Drops VBS files to the startup folder
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: WScript or CScript Dropper
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected SystemBC
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2024-05-14 05:31:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
17 of 24 (70.83%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 1'634 additional samples on MalwareBazaar
Result
Malware family:
zgrat
Score:
10/10
Tags:
family:systembc family:zgrat evasion persistence rat trojan
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Drops startup file
Executes dropped EXE
Loads dropped DLL
Detect ZGRat V1
Modifies security service
Suspicious use of NtCreateUserProcessOtherParentProcess
SystemBC
ZGRat
Malware Config
C2 Extraction:
158.58.172.125:4018
185.219.82.231:4018
185.219.82.231:4018
Unpacked files
SH256 hash:
424f29cf464ec051ef988e50e612f896c1783b2e7033ad80ef4e5d46e108a612
MD5 hash:
4b8d17a544d6a56243eb97b7361b1786
SHA1 hash:
b01426d9e275b0344df317f2dfb2505c83ee397e
SH256 hash:
fe74f06d7437d213d96466b4475db2809c60a4e8aced9df338f4a71cf9bc7c16
MD5 hash:
96422a2b982c99614d31dff7f2b64680
SHA1 hash:
e8f25aa518b0ef54bcdf770479ef28dd99dd8efc
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Dropped by
Privateloader
Delivery method
Distributed via web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.