MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f3f497656360cc536d0b0ff8832fadfa10f3c3ae0aed5c1deb2e4b406afe0d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs YARA 7 File information Comments

SHA256 hash: 0f3f497656360cc536d0b0ff8832fadfa10f3c3ae0aed5c1deb2e4b406afe0d5
SHA3-384 hash: 951f099e94404bb513226c66f2bafaca7adbf8c51eda2238225ccf14b8f027d8938d6af5f4daa9a8b9ce981b8cd735fa
SHA1 hash: 0d35b9748c3950709ea85933e7d17a17cb060adf
MD5 hash: 0f0d41fc4432b747f334c6b611eb243c
humanhash: oranges-early-west-nuts
File name:file
Download: download sample
Signature CoinMiner
File size:2'235'904 bytes
First seen:2023-01-20 13:55:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 02549ff92b49cce693542fc9afb10102 (86 x CoinMiner, 2 x CoinMiner.XMRig, 1 x AgentTesla)
ssdeep 49152:DZhZsl448NxnKepVv/OtCnF+pYKNS+1dK0lmV:D3+lZ8vzV0CnQYKNS+1dKjV
Threatray 4'545 similar samples on MalwareBazaar
TLSH T133A533FF239A8C7FD7D4787196C17889AC12D301E899960B05DE1969AB04FFF4A106E3
TrID 55.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
16.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.9% (.ICL) Windows Icons Library (generic) (2059/9)
6.8% (.EXE) OS/2 Executable (generic) (2029/13)
6.7% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter jstrosch
Tags:CoinMiner exe X64

Intelligence


File Origin
# of uploads :
1
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-01-20 14:06:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a process from a recently created file
Creating a process with a hidden window
DNS request
Creating a service
Launching a service
Loading a system driver
Creating a file in the Windows subdirectories
Enabling autorun for a service
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CallSleep
Verdict:
No Threat
Threat level:
  2/10
Confidence:
67%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitCoin Miner, SilentXMRMiner, Xmrig
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Creates a thread in another existing process (thread injection)
DNS related to crypt mining pools
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Xmrig
System process connects to network (likely due to code injection or exploit)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitCoin Miner
Yara detected SilentXMRMiner
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 788288 Sample: file.exe Startdate: 20/01/2023 Architecture: WINDOWS Score: 100 98 Sigma detected: Xmrig 2->98 100 Malicious sample detected (through community Yara rule) 2->100 102 Antivirus / Scanner detection for submitted sample 2->102 104 6 other signatures 2->104 14 file.exe 2->14         started        17 services64.exe 2->17         started        19 svchost.exe 2->19         started        21 6 other processes 2->21 process3 signatures4 138 Writes to foreign memory regions 14->138 140 Allocates memory in foreign processes 14->140 142 Creates a thread in another existing process (thread injection) 14->142 23 conhost.exe 5 14->23         started        144 Antivirus detection for dropped file 17->144 146 Multi AV Scanner detection for dropped file 17->146 26 conhost.exe 3 17->26         started        148 Changes security center settings (notifications, updates, antivirus, firewall) 19->148 29 MpCmdRun.exe 1 19->29         started        150 Query firmware table information (likely to detect VMs) 21->150 process5 dnsIp6 76 C:\Users\user\AppData\...\services64.exe, PE32+ 23->76 dropped 78 C:\Users\...\services64.exe:Zone.Identifier, ASCII 23->78 dropped 31 cmd.exe 1 23->31         started        33 cmd.exe 1 23->33         started        88 192.168.2.1 unknown unknown 26->88 36 sihost64.exe 26->36         started        38 cmd.exe 1 26->38         started        40 conhost.exe 29->40         started        file7 process8 signatures9 42 services64.exe 31->42         started        45 conhost.exe 31->45         started        90 Uses schtasks.exe or at.exe to add and modify task schedules 33->90 47 conhost.exe 33->47         started        49 schtasks.exe 1 33->49         started        92 Writes to foreign memory regions 36->92 94 Allocates memory in foreign processes 36->94 96 Creates a thread in another existing process (thread injection) 36->96 51 conhost.exe 2 36->51         started        53 taskkill.exe 1 38->53         started        55 conhost.exe 38->55         started        process10 signatures11 112 Writes to foreign memory regions 42->112 114 Allocates memory in foreign processes 42->114 116 Creates a thread in another existing process (thread injection) 42->116 57 conhost.exe 6 42->57         started        process12 file13 80 C:\Users\user\AppData\...\sihost64.exe, PE32+ 57->80 dropped 82 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 57->82 dropped 118 Injects code into the Windows Explorer (explorer.exe) 57->118 120 Writes to foreign memory regions 57->120 122 Modifies the context of a thread in another process (thread injection) 57->122 124 2 other signatures 57->124 61 sihost64.exe 57->61         started        64 explorer.exe 57->64         started        signatures14 process15 dnsIp16 126 Antivirus detection for dropped file 61->126 128 Multi AV Scanner detection for dropped file 61->128 130 Writes to foreign memory regions 61->130 136 2 other signatures 61->136 67 conhost.exe 3 61->67         started        84 51.68.190.80, 14433, 49716 OVHFR France 64->84 86 xmr-eu1.nanopool.org 64->86 132 System process connects to network (likely due to code injection or exploit) 64->132 134 Query firmware table information (likely to detect VMs) 64->134 signatures17 process18 process19 69 services64.exe 67->69         started        signatures20 106 Writes to foreign memory regions 69->106 108 Allocates memory in foreign processes 69->108 110 Creates a thread in another existing process (thread injection) 69->110 72 conhost.exe 3 69->72         started        process21 process22 74 cmd.exe 72->74         started       
Threat name:
Win64.Trojan.Donut
Status:
Malicious
First seen:
2023-01-20 13:56:13 UTC
File Type:
PE+ (Exe)
AV detection:
22 of 39 (56.41%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
XMRig Miner payload
xmrig
Unpacked files
SH256 hash:
0f3f497656360cc536d0b0ff8832fadfa10f3c3ae0aed5c1deb2e4b406afe0d5
MD5 hash:
0f0d41fc4432b747f334c6b611eb243c
SHA1 hash:
0d35b9748c3950709ea85933e7d17a17cb060adf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MacOS_Cryptominer_Generic_333129b7
Author:Elastic Security
Rule name:MacOS_Cryptominer_Xmrig_241780a1
Author:Elastic Security
Rule name:MALWARE_Win_CoinMiner02
Author:ditekSHen
Description:Detects coinmining malware
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:rig_win64_xmrig_6_13_1_xmrig
Author:yarGen Rule Generator
Description:rig_win64 - file xmrig.exe
Reference:https://github.com/Neo23x0/yarGen
Rule name:XMRIG_Monero_Miner
Author:Florian Roth
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 0f3f497656360cc536d0b0ff8832fadfa10f3c3ae0aed5c1deb2e4b406afe0d5

(this sample)

  
Delivery method
Distributed via web download

Comments