MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b976213f5961eb9720219d2624463ec6acc8947004710c7e9885746e2e27234. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 0b976213f5961eb9720219d2624463ec6acc8947004710c7e9885746e2e27234
SHA3-384 hash: 8ad8a388f7dca44fcaf846f36251cd8067c8607366aa4ad238a72a0b0aeccc30dde77af8cd1111db637d497586abe824
SHA1 hash: 9aab2f3af7364624d59cfc17593090bd09b9796d
MD5 hash: 0d967795caea730a77b8b9f0695c3fd2
humanhash: cold-batman-wisconsin-early
File name:exsposes.exe
Download: download sample
Signature CoinMiner
File size:870'912 bytes
First seen:2021-08-25 20:37:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f326f88ca83c9aacaa44acfb8884f1d4 (8 x RedLineStealer, 4 x DCRat, 2 x CoinMiner)
ssdeep 12288:g5oaqjp/9TtIxeu1L2o5nkp3A1iqWp1CpyBPDOyUS3i0i3KXT4:g5v4DTtweu1L2o5nkpphCya0iaXU
Threatray 157 similar samples on MalwareBazaar
TLSH T1F505AE332A9A8DC9C3B2B57D8680E37195F46B993D16A3A302761133F70AC4F1E6D9D1
dhash icon a60373e959712386 (2 x RedLineStealer, 1 x CoinMiner)
Reporter Anonymous
Tags:CoinMiner exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
169
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
exsposes.exe
Verdict:
No threats detected
Analysis date:
2021-08-25 20:38:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process from a recently created file
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Launching a process
Using the Windows Management Instrumentation requests
Sending a UDP request
Creating a file
Creating a process with a hidden window
Creating a file in the system32 directory
Creating a file in the system32 subdirectories
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Result
Threat name:
BitCoin Miner RedLine
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Creates processes via WMI
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Hides threads from debuggers
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Defender Exclusion
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Uses schtasks.exe or at.exe to add and modify task schedules
Wscript starts Powershell (via cmd or directly)
Yara detected BatToExe compiled binary
Yara detected BitCoin Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 471777 Sample: exsposes.exe Startdate: 25/08/2021 Architecture: WINDOWS Score: 100 97 sanctam.net 185.247.226.70, 49737, 58899 FLOKINETSC Romania 2->97 99 bitbucket.org 104.192.141.1, 443, 49739 AMAZON-02US United States 2->99 115 Multi AV Scanner detection for dropped file 2->115 117 Multi AV Scanner detection for submitted file 2->117 119 Yara detected BitCoin Miner 2->119 121 4 other signatures 2->121 12 exsposes.exe 9 2->12         started        15 services32.exe 2->15         started        signatures3 process4 file5 93 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32+ 12->93 dropped 18 cmd.exe 3 12->18         started        21 conhost.exe 12->21         started        95 C:\Users\user\AppData\Local\...\svchost32.exe, PE32+ 15->95 dropped 149 Antivirus detection for dropped file 15->149 151 Adds a directory exclusion to Windows Defender 15->151 signatures6 process7 signatures8 105 Wscript starts Powershell (via cmd or directly) 18->105 107 Uses schtasks.exe or at.exe to add and modify task schedules 18->107 109 Adds a directory exclusion to Windows Defender 18->109 23 extd.exe 2 18->23         started        27 ss.exe 5 18->27         started        30 PxMpxCpS.exe 18->30         started        32 7 other processes 18->32 process9 dnsIp10 101 cdn.discordapp.com 162.159.130.233, 443, 49714, 49717 CLOUDFLARENETUS United States 23->101 81 C:\Users\user\AppData\Local\Temp\...\ss.exe, PE32+ 23->81 dropped 34 wscript.exe 23->34         started        133 Antivirus detection for dropped file 27->133 135 Adds a directory exclusion to Windows Defender 27->135 37 cmd.exe 27->37         started        39 cmd.exe 1 27->39         started        103 135.181.171.9, 16077, 49735, 49745 HETZNER-ASDE Germany 30->103 137 Detected unpacking (changes PE section rights) 30->137 139 Tries to detect sandboxes and other dynamic analysis tools (window names) 30->139 141 Machine Learning detection for dropped file 30->141 145 2 other signatures 30->145 83 C:\...\runtimeperfdhcpsessioncrtcommon.exe, PE32 32->83 dropped 85 C:\Users\user\AppData\Local\...\build.exe, PE32 32->85 dropped 87 C:\runtimeperfdhcp\UfxjqE.bat, ASCII 32->87 dropped 89 C:\Users\user\AppData\Local\...\PxMpxCpS.exe, MS-DOS 32->89 dropped 143 Multi AV Scanner detection for dropped file 32->143 file11 signatures12 process13 signatures14 111 Wscript starts Powershell (via cmd or directly) 34->111 41 cmd.exe 34->41         started        43 svchost32.exe 37->43         started        47 conhost.exe 37->47         started        113 Adds a directory exclusion to Windows Defender 39->113 49 powershell.exe 24 39->49         started        51 conhost.exe 39->51         started        process15 file16 53 runtimeperfdhcpsessioncrtcommon.exe 41->53         started        57 conhost.exe 41->57         started        91 C:\Windows\System32\services32.exe, PE32+ 43->91 dropped 147 Drops executables to the windows directory (C:\Windows) and starts them 43->147 59 services32.exe 43->59         started        61 cmd.exe 43->61         started        63 cmd.exe 43->63         started        signatures17 process18 file19 73 C:\Windows\System32\powercpl\lsass.exe, PE32 53->73 dropped 75 C:\Users\Default\AppData\...\conhost.exe, PE32 53->75 dropped 77 C:\ProgramData\...\WmiPrvSE.exe, PE32 53->77 dropped 79 C:\ProgramData\...\backgroundTaskHost.exe, PE32 53->79 dropped 123 Multi AV Scanner detection for dropped file 53->123 125 Machine Learning detection for dropped file 53->125 127 Creates multiple autostart registry keys 53->127 131 2 other signatures 53->131 129 Adds a directory exclusion to Windows Defender 59->129 65 conhost.exe 61->65         started        67 schtasks.exe 61->67         started        69 conhost.exe 63->69         started        71 choice.exe 63->71         started        signatures20 process21
Threat name:
Win64.Trojan.Sabsik
Status:
Malicious
First seen:
2021-08-25 20:38:05 UTC
AV detection:
7 of 39 (17.95%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
suricata upx
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Unpacked files
SH256 hash:
0b976213f5961eb9720219d2624463ec6acc8947004710c7e9885746e2e27234
MD5 hash:
0d967795caea730a77b8b9f0695c3fd2
SHA1 hash:
9aab2f3af7364624d59cfc17593090bd09b9796d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments