MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 017b15febc04189f8450a52455fe65f942ef1d31d2f8a1e1492b964eff14c455. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 16


Intelligence 16 IOCs YARA 13 File information Comments

SHA256 hash: 017b15febc04189f8450a52455fe65f942ef1d31d2f8a1e1492b964eff14c455
SHA3-384 hash: 7a0f2f281987254ccef49e98a2cc2e710930dfc9e7c8043e2ce92c141152100a78a8d0b599f4a27540db917311315995
SHA1 hash: 206353bb5b604968e4821e115748f9aa3df6a671
MD5 hash: 2b74fd898c6ca79faa64f3d9cae268d4
humanhash: pennsylvania-illinois-venus-saturn
File name:SecuriteInfo.com.Win32.Evo-gen.1231.21474
Download: download sample
Signature CoinMiner
File size:5'766'656 bytes
First seen:2024-03-22 15:34:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (33 x CoinMiner, 17 x AsyncRAT, 15 x BlankGrabber)
ssdeep 98304:QoxgTUyKDV4dn82Ytf6IkQHWmXneKPpfmncntCkHx+Ji3MLepmWr34Dfr:NyKx4dn82Ytyz1yNpfmn+tCux+8m9M4D
TLSH T1724622B0DFA284E5D1480019FFAFB99AF153E79CB139C7098D44B83A2AB40B5319B75D
TrID 38.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
11.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter SecuriteInfoCom
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
359
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
017b15febc04189f8450a52455fe65f942ef1d31d2f8a1e1492b964eff14c455.exe
Verdict:
Malicious activity
Analysis date:
2024-03-22 15:38:51 UTC
Tags:
vidar miner xmrig

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file in the %AppData% directory
Creating a file in the Windows directory
Creating a process from a recently created file
Behavior that indicates a threat
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Deleting a system file
Running batch commands
Creating a service
Setting browser functions hooks
Unauthorized injection to a recently created process
Enabling autorun for a service
Adding an exclusion to Microsoft Defender
Changing the hosts file
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Result
Threat name:
Vidar, Xmrig
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Searches for specific processes (likely to inject)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Stop EventLog
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Vidar
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1414132 Sample: SecuriteInfo.com.Win32.Evo-... Startdate: 22/03/2024 Architecture: WINDOWS Score: 100 108 xmr.2miners.com 2->108 110 steamcommunity.com 2->110 112 3 other IPs or domains 2->112 168 Found malware configuration 2->168 170 Malicious sample detected (through community Yara rule) 2->170 172 Antivirus detection for URL or domain 2->172 174 17 other signatures 2->174 10 SecuriteInfo.com.Win32.Evo-gen.1231.21474.exe 3 2->10         started        14 whrbuflqwhah.exe 2->14         started        signatures3 process4 file5 102 C:\Windows\build.exe, PE32 10->102 dropped 104 C:\Users\user\AppData\Roaming\Payload.exe, PE32 10->104 dropped 184 Encrypted powershell cmdline option found 10->184 186 Drops executables to the windows directory (C:\Windows) and starts them 10->186 188 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->188 16 Payload.exe 3 10->16         started        20 build.exe 37 10->20         started        23 powershell.exe 23 10->23         started        106 C:\Windows\Temp\leclojgajjdi.sys, PE32+ 14->106 dropped 190 Multi AV Scanner detection for dropped file 14->190 192 Modifies the context of a thread in another process (thread injection) 14->192 194 Adds a directory exclusion to Windows Defender 14->194 196 Sample is not signed and drops a device driver 14->196 25 dialer.exe 14->25         started        27 dialer.exe 14->27         started        29 cmd.exe 14->29         started        31 7 other processes 14->31 signatures6 process7 dnsIp8 84 C:\Users\user\AppData\...\Shortcutter.exe, PE32 16->84 dropped 86 C:\Users\user\AppData\Roaming\Miner.exe, PE32+ 16->86 dropped 126 Antivirus detection for dropped file 16->126 128 Multi AV Scanner detection for dropped file 16->128 130 Machine Learning detection for dropped file 16->130 132 Encrypted powershell cmdline option found 16->132 33 Miner.exe 16->33         started        37 Shortcutter.exe 16->37         started        40 powershell.exe 23 16->40         started        114 5.75.221.51, 443, 49709, 49711 HETZNER-ASDE Germany 20->114 116 steamcommunity.com 104.105.90.131, 443, 49707 AKAMAI-ASUS United States 20->116 88 C:\Users\user\AppData\Local\...\sqlm[1].dll, PE32 20->88 dropped 90 C:\Users\user\AppData\...\softokn3[1].dll, PE32 20->90 dropped 92 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 20->92 dropped 94 10 other files (6 malicious) 20->94 dropped 134 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 20->134 136 Tries to harvest and steal ftp login credentials 20->136 138 Tries to harvest and steal browser information (history, passwords, etc) 20->138 148 3 other signatures 20->148 42 conhost.exe 23->42         started        140 Injects code into the Windows Explorer (explorer.exe) 25->140 142 Writes to foreign memory regions 25->142 150 3 other signatures 25->150 50 4 other processes 25->50 118 xmr.2miners.com 162.19.139.184, 2222, 49717 CENTURYLINK-US-LEGACY-QWESTUS United States 27->118 120 relative-national-gibbon.ngrok-free.app 3.134.39.220, 443, 49718, 49740 AMAZON-02US United States 27->120 144 Query firmware table information (likely to detect VMs) 27->144 44 conhost.exe 29->44         started        46 wusa.exe 29->46         started        48 conhost.exe 31->48         started        52 5 other processes 31->52 file9 146 Detected Stratum mining protocol 118->146 signatures10 process11 dnsIp12 96 C:\ProgramData\...\whrbuflqwhah.exe, PE32+ 33->96 dropped 98 C:\Windows\System32\drivers\etc\hosts, ASCII 33->98 dropped 154 Multi AV Scanner detection for dropped file 33->154 156 Modifies the context of a thread in another process (thread injection) 33->156 158 Modifies the hosts file 33->158 160 Adds a directory exclusion to Windows Defender 33->160 54 dialer.exe 33->54         started        57 cmd.exe 33->57         started        59 cmd.exe 33->59         started        63 10 other processes 33->63 122 github.com 140.82.114.4, 443, 49708 GITHUBUS United States 37->122 124 raw.githubusercontent.com 185.199.108.133, 443, 49710 FASTLYUS Netherlands 37->124 100 C:\Users\user\Desktop\test.exe, PE32 37->100 dropped 162 Antivirus detection for dropped file 37->162 164 Machine Learning detection for dropped file 37->164 166 Found direct / indirect Syscall (likely to bypass EDR) 37->166 61 conhost.exe 40->61         started        file13 signatures14 process15 signatures16 176 Contains functionality to inject code into remote processes 54->176 178 Writes to foreign memory regions 54->178 180 Allocates memory in foreign processes 54->180 182 3 other signatures 54->182 65 lsass.exe 54->65 injected 78 3 other processes 54->78 68 conhost.exe 57->68         started        70 wusa.exe 57->70         started        80 2 other processes 59->80 72 conhost.exe 63->72         started        74 conhost.exe 63->74         started        76 conhost.exe 63->76         started        82 7 other processes 63->82 process17 signatures18 152 Writes to foreign memory regions 65->152
Threat name:
Win32.Dropper.Dapato
Status:
Malicious
First seen:
2024-03-22 03:56:57 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
27 of 38 (71.05%)
Threat level:
  3/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:d165eae423b0d6c5abd85327c20d845d evasion persistence stealer
Behaviour
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Creates new service(s)
Downloads MZ/PE file
Drops file in Drivers directory
Stops running service(s)
Detect Vidar Stealer
Modifies security service
Vidar
Malware Config
C2 Extraction:
https://steamcommunity.com/profiles/76561199654112719
https://t.me/r2d0s
Unpacked files
SH256 hash:
f4da7f22e8eb28cfd8ecb0c3fdc8923b2ba5c5e96b917cbcf53b6bbed1c22551
MD5 hash:
4ce8fc5016e97f84dadaf983cca845f2
SHA1 hash:
0d6fb5a16442cf393d5658a9f40d2501d8fd725c
SH256 hash:
b256448e3219b2b7033b4c214c78b02db0d4e000f943fc98dffede3d8a6a7cf3
MD5 hash:
ffe5ff4a06e3a7696484bbce8f3ade91
SHA1 hash:
af919d9b6b7abef80fb5c85498ffc5ec0c0ae394
Detections:
VidarStealer INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
SH256 hash:
017b15febc04189f8450a52455fe65f942ef1d31d2f8a1e1492b964eff14c455
MD5 hash:
2b74fd898c6ca79faa64f3d9cae268d4
SHA1 hash:
206353bb5b604968e4821e115748f9aa3df6a671
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MALWARE_Win_R77
Author:ditekSHen
Description:Detects r77 rootkit
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Rootkit_R77_d0367e28
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/elastic-security-labs-steps-through-the-r77-rootkit

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 017b15febc04189f8450a52455fe65f942ef1d31d2f8a1e1492b964eff14c455

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteA

Comments