MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1cd9ef92c56b7fe1324c0df4a3597e1b935cca3c0b1ab85dc23e316165a2c0c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 1cd9ef92c56b7fe1324c0df4a3597e1b935cca3c0b1ab85dc23e316165a2c0c9
SHA3-384 hash: 52256ea399e0e0a488d8b63b1e95caf790e6f7c16b4c0a5365c5e791143efdbd25ff267a1f76859ef6878b70b1a00994
SHA1 hash: 8c5c2c74a8396b3ab8091579b3d9c279b87144a6
MD5 hash: 551034ce6f4665cebccbb79b2898f89a
humanhash: mexico-blue-sodium-illinois
File name:551034ce6f4665cebccbb79b2898f89a
Download: download sample
Signature CoinMiner
File size:413'696 bytes
First seen:2021-09-01 22:52:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 1536:CD5TjiRYF8jkBjWwyj+/cF9RwEBQUPkgb:CFTjiRYFAkG+0F9RwEqU8gb
Threatray 190 similar samples on MalwareBazaar
TLSH T16494D418B228ED0EDD2987F40EB9CF981A90BE101DD1E99F37963F0F5E32152552E287
dhash icon 0c0cdcb46d8ecc70 (1 x CoinMiner)
Reporter zbetcheckin
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
175
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
551034ce6f4665cebccbb79b2898f89a
Verdict:
No threats detected
Analysis date:
2021-09-01 22:55:24 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Launching a process
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Creating a process with a hidden window
Creating a file
Creating a process from a recently created file
Sending a UDP request
Creating a file in the %AppData% subdirectories
DNS request
Connection attempt
Sending a custom TCP request
Connecting to a cryptocurrency mining pool
Creating a service
Launching a service
Loading a system driver
Unauthorized injection to a recently created process
Enabling autorun for a service
Enabling autorun by creating a file
Unauthorized injection to a system process
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
BitCoin Miner Xmrig
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Detected Stratum mining protocol
DNS related to crypt mining pools
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Xmrig
System process connects to network (likely due to code injection or exploit)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitCoin Miner
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 476113 Sample: YbVuzaXA3o Startdate: 02/09/2021 Architecture: WINDOWS Score: 100 145 Sigma detected: Xmrig 2->145 147 Malicious sample detected (through community Yara rule) 2->147 149 Multi AV Scanner detection for submitted file 2->149 151 8 other signatures 2->151 14 YbVuzaXA3o.exe 5 2->14         started        18 services64.exe 3 2->18         started        20 svchost.exe 2->20         started        22 8 other processes 2->22 process3 dnsIp4 127 C:\Users\user\AppData\...\YbVuzaXA3o.exe.log, ASCII 14->127 dropped 185 Adds a directory exclusion to Windows Defender 14->185 25 cmd.exe 1 14->25         started        27 cmd.exe 1 14->27         started        187 Multi AV Scanner detection for dropped file 18->187 189 Machine Learning detection for dropped file 18->189 30 cmd.exe 18->30         started        191 Changes security center settings (notifications, updates, antivirus, firewall) 20->191 32 MpCmdRun.exe 20->32         started        129 127.0.0.1 unknown unknown 22->129 131 192.168.2.1 unknown unknown 22->131 file5 signatures6 process7 signatures8 34 svchost64.exe 6 25->34         started        38 conhost.exe 25->38         started        163 Uses schtasks.exe or at.exe to add and modify task schedules 27->163 165 Adds a directory exclusion to Windows Defender 27->165 40 powershell.exe 22 27->40         started        42 powershell.exe 22 27->42         started        44 conhost.exe 27->44         started        50 2 other processes 27->50 46 conhost.exe 30->46         started        52 4 other processes 30->52 48 conhost.exe 32->48         started        process9 file10 117 C:\Users\...\services64.exe:Zone.Identifier, ASCII 34->117 dropped 153 Multi AV Scanner detection for dropped file 34->153 155 Machine Learning detection for dropped file 34->155 157 Contains functionality to inject code into remote processes 34->157 54 services64.exe 34->54         started        58 cmd.exe 1 34->58         started        60 cmd.exe 34->60         started        signatures11 process12 file13 119 C:\Users\user\AppData\Local\...\svchost64.exe, PE32+ 54->119 dropped 161 Adds a directory exclusion to Windows Defender 54->161 62 cmd.exe 54->62         started        64 cmd.exe 54->64         started        67 conhost.exe 58->67         started        69 schtasks.exe 1 58->69         started        71 conhost.exe 60->71         started        73 choice.exe 60->73         started        signatures14 process15 signatures16 75 svchost64.exe 62->75         started        80 conhost.exe 62->80         started        141 Adds a directory exclusion to Windows Defender 64->141 82 conhost.exe 64->82         started        84 powershell.exe 64->84         started        86 powershell.exe 64->86         started        88 2 other processes 64->88 process17 dnsIp18 133 sanctam.net 185.65.135.234, 49705, 58899 ESAB-ASSE Sweden 75->133 135 bitbucket.org 104.192.141.1, 443, 49706 AMAZON-02US United States 75->135 123 C:\Users\user\AppData\...\sihost64.exe, PE32+ 75->123 dropped 125 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 75->125 dropped 177 Injects code into the Windows Explorer (explorer.exe) 75->177 179 Writes to foreign memory regions 75->179 181 Allocates memory in foreign processes 75->181 183 3 other signatures 75->183 90 sihost64.exe 75->90         started        94 explorer.exe 75->94         started        97 cmd.exe 75->97         started        99 cmd.exe 75->99         started        file19 signatures20 process21 dnsIp22 121 C:\Users\user\AppData\...\services64.exe, PE32+ 90->121 dropped 167 Multi AV Scanner detection for dropped file 90->167 169 Machine Learning detection for dropped file 90->169 101 services64.exe 90->101         started        137 51.15.54.102, 14444, 49707 OnlineSASFR France 94->137 139 xmr-eu1.nanopool.org 94->139 171 System process connects to network (likely due to code injection or exploit) 94->171 173 Query firmware table information (likely to detect VMs) 94->173 104 conhost.exe 97->104         started        106 schtasks.exe 97->106         started        108 conhost.exe 99->108         started        110 choice.exe 99->110         started        file23 175 Detected Stratum mining protocol 137->175 signatures24 process25 signatures26 159 Adds a directory exclusion to Windows Defender 101->159 112 cmd.exe 101->112         started        process27 signatures28 143 Adds a directory exclusion to Windows Defender 112->143 115 conhost.exe 112->115         started        process29
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-28 03:12:37 UTC
AV detection:
26 of 45 (57.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Executes dropped EXE
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
1cd9ef92c56b7fe1324c0df4a3597e1b935cca3c0b1ab85dc23e316165a2c0c9
MD5 hash:
551034ce6f4665cebccbb79b2898f89a
SHA1 hash:
8c5c2c74a8396b3ab8091579b3d9c279b87144a6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 1cd9ef92c56b7fe1324c0df4a3597e1b935cca3c0b1ab85dc23e316165a2c0c9

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-01 22:52:08 UTC

url : hxxps://thehairtransplantationturkey.tk/ilk.exe