MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0fb22c56481a6044c6f1800b78c6acf9dc690c1ee914777b4e90c01ec4a52cb0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner.XMRig


Vendor detections: 13


Intelligence 13 IOCs YARA 1 File information Comments 1

SHA256 hash: 0fb22c56481a6044c6f1800b78c6acf9dc690c1ee914777b4e90c01ec4a52cb0
SHA3-384 hash: 844b9a381b21a342390b8550547bb2a059fab2cc9c92c607fe1431ed28258a80a1af67e21cb32198d32880efb51b3e24
SHA1 hash: 19f4c7ce63d5433dba2645f1b5d5f4116ffd4573
MD5 hash: 805fc7da814fe999b39c90dbd086cb84
humanhash: pluto-grey-green-yellow
File name:805fc7da814fe999b39c90dbd086cb84
Download: download sample
Signature CoinMiner.XMRig
File size:77'824 bytes
First seen:2022-01-09 21:54:28 UTC
Last seen:2022-01-09 23:31:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 13d4ecb21ffd4b77a0608840e931a3df (2 x CoinMiner, 1 x CoinMiner.XMRig, 1 x Phorpiex)
ssdeep 1536:C3Mz86CLyBfeNaoL1Ajhv2tpFogMJu5FJCFj:JweCejd2aA5FJ
Threatray 10 similar samples on MalwareBazaar
TLSH T1B5732910F6D0D03AF0F740FBD2FB15AA592CEEB4130AA8E753D4A89F5B215D1A932593
Reporter zbetcheckin
Tags:32 CoinMiner.XMRig exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
368
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
805fc7da814fe999b39c90dbd086cb84
Verdict:
Malicious activity
Analysis date:
2022-01-09 21:55:53 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Сreating synchronization primitives
Creating a file in the Windows directory
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Searching for many windows
Creating a window
Sending a UDP request
Creating a file
Creating a file in the %temp% directory
Sending a custom TCP request
Changing an executable file
Launching a service
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Enabling threat expansion on mass storage devices
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CallSleep
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
83%
Tags:
evasive greyware phorpiex shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitCoin Miner Phorpiex SilentXMRMiner Xm
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the user root directory
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Suspicious Svchost Process
Sigma detected: Xmrig
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitCoin Miner
Yara detected Phorpiex
Yara detected SilentXMRMiner
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 549876 Sample: va7IV3k6le Startdate: 09/01/2022 Architecture: WINDOWS Score: 100 131 Sigma detected: Xmrig 2->131 133 Malicious sample detected (through community Yara rule) 2->133 135 Antivirus detection for URL or domain 2->135 137 14 other signatures 2->137 13 va7IV3k6le.exe 1 1 2->13         started        17 wincsvns.exe 2->17         started        19 svchost.exe 2->19         started        21 11 other processes 2->21 process3 file4 101 C:\Windows\wsparscv.exe, PE32 13->101 dropped 179 Found evasive API chain (may stop execution after checking mutex) 13->179 181 Contains functionality to check if Internet connection is working 13->181 183 Drops executables to the windows directory (C:\Windows) and starts them 13->183 191 2 other signatures 13->191 23 wsparscv.exe 8 22 13->23         started        185 Writes to foreign memory regions 17->185 187 Allocates memory in foreign processes 17->187 189 Creates a thread in another existing process (thread injection) 17->189 28 conhost.exe 17->28         started        signatures5 process6 dnsIp7 125 185.215.113.84, 49753, 49755, 49758 WHOLESALECONNECTIONSNL Portugal 23->125 127 189.191.40.58, 40500 UninetSAdeCVMX Mexico 23->127 129 27 other IPs or domains 23->129 91 C:\Users\user\AppData\...\3358232641.exe, PE32 23->91 dropped 93 C:\Users\user\AppData\...\1617114100.exe, PE32 23->93 dropped 95 C:\Users\user\AppData\...\1252823192.exe, PE32 23->95 dropped 147 Antivirus detection for dropped file 23->147 149 Found evasive API chain (may stop execution after checking mutex) 23->149 151 Contains functionality to check if Internet connection is working 23->151 163 4 other signatures 23->163 30 3358232641.exe 14 23->30         started        34 1252823192.exe 14 23->34         started        36 1617114100.exe 14 23->36         started        97 C:\Users\user\AppData\...\sihost64.exe, PE32+ 28->97 dropped 99 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 28->99 dropped 153 Writes to foreign memory regions 28->153 155 Modifies the context of a thread in another process (thread injection) 28->155 157 Sample is not signed and drops a device driver 28->157 159 Injects a PE file into a foreign processes 28->159 39 sihost64.exe 28->39         started        41 svchost.exe 28->41         started        file8 161 Detected Stratum mining protocol 125->161 signatures9 process10 dnsIp11 105 C:\Users\user\AppData\Local\Temp\21026.exe, PE32+ 30->105 dropped 107 C:\Users\user\AppData\Local\...\xmr[1].exe, PE32+ 30->107 dropped 195 Antivirus detection for dropped file 30->195 197 Machine Learning detection for dropped file 30->197 199 Hides that the sample has been downloaded from the Internet (zone.identifier) 30->199 43 21026.exe 30->43         started        109 C:\Users\...\Windows Security Service.exe, PE32 34->109 dropped 111 C:\Users\user\AppData\Local\...\peinf[1].exe, PE32 34->111 dropped 46 Windows Security Service.exe 1 34->46         started        49 Windows Security Service.exe 34->49         started        51 Windows Security Service.exe 34->51         started        123 192.168.2.1 unknown unknown 36->123 113 C:\Users\user\...\Windows Security Update.exe, PE32 36->113 dropped 115 C:\Users\user\AppData\Local\...\secdis[1].exe, PE32 36->115 dropped 53 Windows Security Update.exe 36->53         started        55 Windows Security Update.exe 36->55         started        57 Windows Security Update.exe 36->57         started        201 Writes to foreign memory regions 39->201 203 Allocates memory in foreign processes 39->203 205 Creates a thread in another existing process (thread injection) 39->205 59 conhost.exe 39->59         started        207 Query firmware table information (likely to detect VMs) 41->207 file12 signatures13 process14 file15 167 Writes to foreign memory regions 43->167 169 Allocates memory in foreign processes 43->169 171 Creates a thread in another existing process (thread injection) 43->171 61 conhost.exe 4 43->61         started        117 C:\ProgramData\Adobe\Setup\...\setup.exe, PE32 46->117 dropped 119 C:\...\RdrServicesUpdater2_1901220035.exe, PE32 46->119 dropped 121 C:\ProgramData\Adobe\...\AdobeARMHelper.exe, PE32 46->121 dropped 65 Windows Security Update.exe 53->65         started        67 Windows Security Update.exe 55->67         started        69 Windows Security Update.exe 57->69         started        signatures16 process17 file18 103 C:\Users\user\wincsvns.exe, PE32+ 61->103 dropped 193 Drops PE files to the user root directory 61->193 71 cmd.exe 1 61->71         started        73 cmd.exe 1 61->73         started        signatures19 process20 signatures21 76 wincsvns.exe 71->76         started        79 conhost.exe 71->79         started        165 Uses schtasks.exe or at.exe to add and modify task schedules 73->165 81 conhost.exe 73->81         started        83 schtasks.exe 1 73->83         started        process22 signatures23 173 Writes to foreign memory regions 76->173 175 Allocates memory in foreign processes 76->175 177 Creates a thread in another existing process (thread injection) 76->177 85 conhost.exe 76->85         started        process24 signatures25 139 Writes to foreign memory regions 85->139 141 Modifies the context of a thread in another process (thread injection) 85->141 143 Injects a PE file into a foreign processes 85->143 88 svchost.exe 85->88         started        process26 signatures27 145 Query firmware table information (likely to detect VMs) 88->145
Threat name:
Win32.Trojan.FWDisable
Status:
Malicious
First seen:
2022-01-09 07:06:07 UTC
File Type:
PE (Exe)
AV detection:
31 of 43 (72.09%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig evasion miner persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
Executes dropped EXE
XMRig Miner Payload
Modifies security service
Windows security bypass
xmrig
Unpacked files
SH256 hash:
0fb22c56481a6044c6f1800b78c6acf9dc690c1ee914777b4e90c01ec4a52cb0
MD5 hash:
805fc7da814fe999b39c90dbd086cb84
SHA1 hash:
19f4c7ce63d5433dba2645f1b5d5f4116ffd4573
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner.XMRig

Executable exe 0fb22c56481a6044c6f1800b78c6acf9dc690c1ee914777b4e90c01ec4a52cb0

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-09 21:54:30 UTC

url : hxxp://185.215.113.84/tpeinf.exe