MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f0ff53fb22cf1132f91554c9515f57713674a1d60c3dea204fcb7d7976f337a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments 1

SHA256 hash: 0f0ff53fb22cf1132f91554c9515f57713674a1d60c3dea204fcb7d7976f337a
SHA3-384 hash: 05335fd907cb2e55bed4b04cb0378faaf812013a3259e7664088fc50a5dfa2590ce26edff434114b4af395a26a5dc42f
SHA1 hash: dcb7a9958ac22e65f4f8e3580d78e128f4e9b4fc
MD5 hash: a01bddd8861349780a27fbd80decea21
humanhash: queen-orange-yankee-cold
File name:a01bddd8861349780a27fbd80decea21
Download: download sample
Signature CoinMiner
File size:29'696 bytes
First seen:2022-02-15 16:12:17 UTC
Last seen:2022-02-15 17:52:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 768:m1kJDCTsK6ZSt98pbEy90WxjKz98xF9sh0pX:AVsK1t9I0Wxjq+F9sAX
Threatray 274 similar samples on MalwareBazaar
TLSH T104D2D01926AC189AF6385BBF0DD3335A07BEFAD72B12D26E98C0472D2D2174049E4DF4
Reporter zbetcheckin
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
270
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
http://95.143.178.121/
Verdict:
Malicious activity
Analysis date:
2022-02-16 00:05:36 UTC
Tags:
opendir loader trojan stealer raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Launching a process
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file
Creating a process from a recently created file
Creating a file in the system32 directory
Sending a custom TCP request
Creating a file in the system32 subdirectories
DNS request
Unauthorized injection to a recently created process
Query of malicious DNS domain
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitCoin Miner SilentXMRMiner
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspcious CLR Logs Creation
Sigma detected: Suspicious Script Execution From Temp Folder
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected BitCoin Miner
Yara detected SilentXMRMiner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 572709 Sample: GYmvYaCBaL Startdate: 15/02/2022 Architecture: WINDOWS Score: 100 109 Multi AV Scanner detection for domain / URL 2->109 111 Antivirus / Scanner detection for submitted sample 2->111 113 Multi AV Scanner detection for submitted file 2->113 115 6 other signatures 2->115 10 GYmvYaCBaL.exe 5 2->10         started        15 services32.exe 4 2->15         started        process3 dnsIp4 107 192.168.2.1 unknown unknown 10->107 97 C:\Users\user\AppData\Local\...\svchost32.exe, PE32+ 10->97 dropped 99 C:\Users\user\AppData\...behaviorgraphYmvYaCBaL.exe.log, ASCII 10->99 dropped 127 Adds a directory exclusion to Windows Defender 10->127 17 cmd.exe 1 10->17         started        19 cmd.exe 1 10->19         started        129 Antivirus detection for dropped file 15->129 131 Multi AV Scanner detection for dropped file 15->131 133 Machine Learning detection for dropped file 15->133 22 cmd.exe 15->22         started        24 cmd.exe 15->24         started        file5 signatures6 process7 signatures8 26 svchost32.exe 6 17->26         started        30 conhost.exe 17->30         started        117 Uses schtasks.exe or at.exe to add and modify task schedules 19->117 119 Adds a directory exclusion to Windows Defender 19->119 32 powershell.exe 23 19->32         started        34 conhost.exe 19->34         started        36 powershell.exe 19->36         started        43 2 other processes 19->43 38 svchost32.exe 22->38         started        41 conhost.exe 22->41         started        45 5 other processes 24->45 process9 dnsIp10 89 C:\Windows\System32\services32.exe, PE32+ 26->89 dropped 91 C:\Windows\...\services32.exe:Zone.Identifier, ASCII 26->91 dropped 93 C:\Users\user\AppData\...\svchost32.exe.log, ASCII 26->93 dropped 121 Antivirus detection for dropped file 26->121 123 Machine Learning detection for dropped file 26->123 125 Drops executables to the windows directory (C:\Windows) and starts them 26->125 47 services32.exe 4 26->47         started        50 cmd.exe 1 26->50         started        52 cmd.exe 26->52         started        54 sihost32.exe 32->54         started        56 cmd.exe 32->56         started        58 cmd.exe 32->58         started        101 sanctam.net 38->101 103 github.com 140.82.121.3, 443, 49763 GITHUBUS United States 38->103 105 raw.githubusercontent.com 185.199.108.133, 443, 49765 FASTLYUS Netherlands 38->105 95 C:\Windows\System32\...\sihost32.exe, PE32+ 38->95 dropped file11 signatures12 process13 signatures14 137 Adds a directory exclusion to Windows Defender 47->137 60 cmd.exe 47->60         started        63 cmd.exe 47->63         started        65 conhost.exe 50->65         started        67 schtasks.exe 1 50->67         started        69 conhost.exe 52->69         started        71 choice.exe 52->71         started        139 Antivirus detection for dropped file 54->139 141 Machine Learning detection for dropped file 54->141 73 conhost.exe 56->73         started        75 schtasks.exe 56->75         started        77 2 other processes 58->77 process15 signatures16 135 Adds a directory exclusion to Windows Defender 60->135 79 conhost.exe 60->79         started        81 powershell.exe 60->81         started        83 powershell.exe 60->83         started        87 2 other processes 60->87 85 conhost.exe 63->85         started        process17
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-02-15 14:06:23 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
3
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
0f0ff53fb22cf1132f91554c9515f57713674a1d60c3dea204fcb7d7976f337a
MD5 hash:
a01bddd8861349780a27fbd80decea21
SHA1 hash:
dcb7a9958ac22e65f4f8e3580d78e128f4e9b4fc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 0f0ff53fb22cf1132f91554c9515f57713674a1d60c3dea204fcb7d7976f337a

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-02-15 16:12:19 UTC

url : hxxp://95.143.178.121/UPuzYzry2.exe