MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06ae265d022abb3efb56a9aaf1b4cbee322817434b6dbebd93afa4e2869a2236. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 06ae265d022abb3efb56a9aaf1b4cbee322817434b6dbebd93afa4e2869a2236
SHA3-384 hash: 2bfba4bdb90c142130192da60ce618d5c489ed453cde3fccfc9d1cb664ae6a4e9d5e8d0fb1e720b6cd3f2be813601bf2
SHA1 hash: 8a376464b78a3347b5252d01a60b9452e36bb37b
MD5 hash: 88d0108f230277eedb029bb7996aacf5
humanhash: low-solar-johnny-king
File name:HWID Spoofer.exe
Download: download sample
File size:2'201'600 bytes
First seen:2021-06-24 21:59:30 UTC
Last seen:2021-06-24 22:46:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 49152:VHh9t+k9ygodrENjEJ3prMpjqc6G2qIv7KDdncc:hnt+PENQJZApp+8dnh
Threatray 56 similar samples on MalwareBazaar
TLSH 64A53358FBC042A5F45DEABF30AB2E3E54BD318B52D50B10B4607424A70BBD85B77DA8
Reporter Anonymous
Tags:exe gaming


Avatar
Anonymous
We run a multi-gaming organisation/multi-game guild with a large amount of members, and receive targeted spearphishing and non-targeted malware typically RATs or keyloggers, attempting to compromise accounts and steal items.

On our forums, we also automatically quarantine new accounts that DM users links. These uploads are typically the outputs of online uploads, spambots, or users trying to steal kids' game accounts.

Intelligence


File Origin
# of uploads :
2
# of downloads :
112
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
HWID Spoofer.exe
Verdict:
No threats detected
Analysis date:
2021-06-24 22:03:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to a pastebin service (likely for C&C)
Detected Stratum mining protocol
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Xmrig
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 440215 Sample: HWID Spoofer.exe Startdate: 25/06/2021 Architecture: WINDOWS Score: 100 74 Sigma detected: Xmrig 2->74 76 Malicious sample detected (through community Yara rule) 2->76 78 Yara detected Xmrig cryptocurrency miner 2->78 80 5 other signatures 2->80 8 HWID Spoofer.exe 8 2->8         started        12 Cheats.exe 4 2->12         started        14 svchost.exe 2->14         started        16 10 other processes 2->16 process3 dnsIp4 54 C:\Users\user\AppData\Local\Temp\Cheats.exe, PE32+ 8->54 dropped 56 C:\Users\user\...\Cheats.exe:Zone.Identifier, ASCII 8->56 dropped 58 C:\Users\user\...\HWID Spoofer.exe.log, ASCII 8->58 dropped 100 Sample is not signed and drops a device driver 8->100 19 Cheats.exe 3 8->19         started        23 cmd.exe 1 8->23         started        102 Machine Learning detection for dropped file 12->102 104 Injects code into the Windows Explorer (explorer.exe) 12->104 106 Writes to foreign memory regions 12->106 110 3 other signatures 12->110 25 explorer.exe 12->25         started        28 cmd.exe 1 12->28         started        108 Changes security center settings (notifications, updates, antivirus, firewall) 14->108 30 MpCmdRun.exe 14->30         started        60 127.0.0.1 unknown unknown 16->60 file5 signatures6 process7 dnsIp8 52 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 19->52 dropped 82 Injects code into the Windows Explorer (explorer.exe) 19->82 84 Writes to foreign memory regions 19->84 86 Allocates memory in foreign processes 19->86 98 2 other signatures 19->98 32 explorer.exe 19->32         started        36 cmd.exe 1 19->36         started        88 Uses schtasks.exe or at.exe to add and modify task schedules 23->88 38 conhost.exe 23->38         started        40 schtasks.exe 1 23->40         started        66 mine.bmpool.org 157.90.156.89, 49716, 49717, 6004 REDIRISRedIRISAutonomousSystemES United States 25->66 68 pastebin.com 104.23.99.190, 443, 49713, 49714 CLOUDFLARENETUS United States 25->68 90 System process connects to network (likely due to code injection or exploit) 25->90 92 Query firmware table information (likely to detect VMs) 25->92 94 Tries to detect sandboxes and other dynamic analysis tools (window names) 25->94 42 conhost.exe 28->42         started        44 schtasks.exe 1 28->44         started        46 conhost.exe 30->46         started        file9 96 Detected Stratum mining protocol 66->96 signatures10 process11 dnsIp12 62 mine.bmpool.org 32->62 64 pastebin.com 32->64 70 System process connects to network (likely due to code injection or exploit) 32->70 72 Query firmware table information (likely to detect VMs) 32->72 48 conhost.exe 36->48         started        50 schtasks.exe 1 36->50         started        signatures13 process14
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-06-24 22:00:27 UTC
AV detection:
15 of 46 (32.61%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Creates scheduled task(s)
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Executes dropped EXE
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
06ae265d022abb3efb56a9aaf1b4cbee322817434b6dbebd93afa4e2869a2236
MD5 hash:
88d0108f230277eedb029bb7996aacf5
SHA1 hash:
8a376464b78a3347b5252d01a60b9452e36bb37b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments