MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 15337a846c1e262136124361b3624ddd3519cf3c7f93aba1ed75728a482fc662. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments 1

SHA256 hash: 15337a846c1e262136124361b3624ddd3519cf3c7f93aba1ed75728a482fc662
SHA3-384 hash: 0af758b85f007f4ed02b51bad5ace24c51207750c2016a66452349538172833086c55c693aa69705fa8923377567234f
SHA1 hash: 8934580e7ee3f3852e159298769bdd38bcaa12a0
MD5 hash: d572da9202196121d952231f26d65d07
humanhash: pasta-five-echo-oklahoma
File name:d572da9202196121d952231f26d65d07
Download: download sample
Signature CoinMiner
File size:3'627'520 bytes
First seen:2021-07-23 20:01:11 UTC
Last seen:2021-07-23 20:48:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 49152:JJjN9IQEiXrMhVoo5g+XoQG15WzZp13/Ln7c4lo4nC8sbXQdrb:bnIQEiUEPb
TLSH T13DF512F11EB0D5A4CF8F073ACB7E29BA3E2620FB9B4117D694B54294114BBD4DD928C8
dhash icon c0d8d090dcd292b2 (1 x CoinMiner, 1 x CoinMiner.XMRig)
Reporter zbetcheckin
Tags:32 CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
185
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0f65b4fa711b40e3c89a81fa69d8690f
Verdict:
Malicious activity
Analysis date:
2021-07-23 20:04:59 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
DNS related to crypt mining pools
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: WScript or CScript Dropper
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 453466 Sample: 4rC1bQcnl5 Startdate: 23/07/2021 Architecture: WINDOWS Score: 100 56 xmr-us-east1.nanopool.org 2->56 66 Malicious sample detected (through community Yara rule) 2->66 68 Antivirus detection for URL or domain 2->68 70 Multi AV Scanner detection for dropped file 2->70 72 9 other signatures 2->72 9 4rC1bQcnl5.exe 5 2->9         started        13 svchost.exe 2->13         started        15 svchost.exe 9 1 2->15         started        18 8 other processes 2->18 signatures3 process4 dnsIp5 50 C:\Users\user\AppData\...\4rC1bQcnl5.exe, PE32 9->50 dropped 52 C:\Users\...\4rC1bQcnl5.exe:Zone.Identifier, ASCII 9->52 dropped 54 C:\Users\user\AppData\...\4rC1bQcnl5.exe.log, ASCII 9->54 dropped 84 Writes to foreign memory regions 9->84 86 Injects a PE file into a foreign processes 9->86 20 4rC1bQcnl5.exe 6 9->20         started        25 4rC1bQcnl5.exe 9->25         started        88 Changes security center settings (notifications, updates, antivirus, firewall) 13->88 27 MpCmdRun.exe 1 13->27         started        64 127.0.0.1 unknown unknown 15->64 file6 signatures7 process8 dnsIp9 58 45.144.225.135, 49717, 80 DEDIPATH-LLCUS Netherlands 20->58 44 C:\ProgramData\LKBNMTFJgl\csrss, PE32 20->44 dropped 46 C:\ProgramData\LKBNMTFJgl\r.vbs, data 20->46 dropped 74 Writes to foreign memory regions 20->74 76 Allocates memory in foreign processes 20->76 78 Modifies the context of a thread in another process (thread injection) 20->78 82 2 other signatures 20->82 29 notepad.exe 20->29         started        33 cmd.exe 1 20->33         started        35 oQOWFbKllEKo.exe 20->35 injected 80 Multi AV Scanner detection for dropped file 25->80 37 conhost.exe 27->37         started        file10 signatures11 process12 dnsIp13 60 192.99.69.170, 14444, 49718, 49728 OVHFR Canada 29->60 62 xmr-us-east1.nanopool.org 29->62 90 System process connects to network (likely due to code injection or exploit) 29->90 39 wscript.exe 1 33->39         started        42 conhost.exe 33->42         started        signatures14 92 Detected Stratum mining protocol 60->92 process15 file16 48 C:\Users\user\AppData\...\viTRMUuKeV.url, MS 39->48 dropped
Threat name:
ByteCode-MSIL.Downloader.Seraph
Status:
Malicious
First seen:
2021-07-23 20:02:09 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Drops startup file
UPX packed file
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
9844b1d0904c4bbe9ad17fb325a9beadf8d731dea8b92100419aee92cedc6fdd
MD5 hash:
4db6eac9f1cd0fb3bfce3dafdccb9e00
SHA1 hash:
b646e7824bea0e253ee957311296e605dfa5af28
SH256 hash:
ef9f6836caabf4537d3793fba00070aaea210969184e9d00227961d46322fd15
MD5 hash:
313061a18dae290c228ce4b3dbbcc704
SHA1 hash:
db48c4e2639a45938ff34b0b0bf21c9f54e9b561
SH256 hash:
aff2e0a27a9e0100404bee6bf03a04d215ecb0a3a3ab1522429fc73c1843dd7d
MD5 hash:
e6b80abc207db5a99ca2cc0cc7be65e8
SHA1 hash:
b331e7c300b220601e315037a0931a9f9459b8d7
SH256 hash:
98bb360c03e34f381ca3e8449f8117989f7c0a0b456b4897fab42d846aa2e88c
MD5 hash:
3da46c9fb4b9befe92e9eb52e71d031b
SHA1 hash:
56291613bf0a5b8cffb19fb15ccbaa5b4ca036f2
SH256 hash:
15337a846c1e262136124361b3624ddd3519cf3c7f93aba1ed75728a482fc662
MD5 hash:
d572da9202196121d952231f26d65d07
SHA1 hash:
8934580e7ee3f3852e159298769bdd38bcaa12a0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 15337a846c1e262136124361b3624ddd3519cf3c7f93aba1ed75728a482fc662

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-23 20:01:12 UTC

url : hxxp://45.144.225.135/notepad.exe