MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 30dfbc77449f4331cfc81ba3c7ae6ea5fd15739f763a6026e60b224c26b0f355. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
CoinMiner
Vendor detections: 14
| SHA256 hash: | 30dfbc77449f4331cfc81ba3c7ae6ea5fd15739f763a6026e60b224c26b0f355 |
|---|---|
| SHA3-384 hash: | 2473ff1bc7b6f441ce2528d2da9c6cf30b4810a53007972d84b3de571035086ffa56d857a6b7f8409585b8cf014a9875 |
| SHA1 hash: | b5bd299236c834cbffa3742201163f31e6692c14 |
| MD5 hash: | f1c58befdb90527ffec818330b0d68f9 |
| humanhash: | mississippi-butter-autumn-princess |
| File name: | 30dfbc77449f4331cfc81ba3c7ae6ea5fd15739f763a6026e60b224c26b0f355 |
| Download: | download sample |
| Signature | CoinMiner |
| File size: | 1'624'576 bytes |
| First seen: | 2024-04-13 13:47:55 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a12d186f65c99f872323a61923ce70d8 (6 x CoinMiner) |
| ssdeep | 24576:Z1txXTADYDZL89t68/kGhluhQkibRRcJ9ltZa9AHjnLwPln5u5h4uhH3eDIOIu4v:RxDD9i68/kuRRcJ9ltrLwPlmhxOwVZ |
| TLSH | T1BA754D98FA87A0F4DA630DB4518BE73FDA301E054028FBB7DF89DB48E473B56A209155 |
| TrID | 25.6% (.EXE) InstallShield setup (43053/19/16) 18.5% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.1% (.EXE) UPX compressed Win32 Executable (27066/9/6) 9.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 7.8% (.SCR) Windows screen saver (13097/50/3) |
| Reporter | |
| Tags: | CoinMiner |
Intelligence
File Origin
GRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
8ab1953675c219c460f81c7184bad4dd82775d58fc7c3504ff00f7af46b09aa3
77e018bc4ed0354cb6391be242517fd069a343bdb7c663087f9e0e852f6b8da1
2252872955020d53a56a270bda711a79e43c026d5c5c4efc14b42d7bb7ff1156
30dfbc77449f4331cfc81ba3c7ae6ea5fd15739f763a6026e60b224c26b0f355
d5c211f5312a00fe3084676194fc6de12e25be818dd60df5d28dc6b37435993c
a6bb6518bd35f35a432dd1a07de742c136732c195a5bfa4028030a036a3cd28e
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CoinMiner_Strings |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects mining pool protocol string in Executable |
| Reference: | https://minergate.com/faq/what-pool-address |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | MacOS_Cryptominer_Generic_333129b7 |
|---|---|
| Author: | Elastic Security |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | MAL_XMR_Miner_May19_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Monero Crypto Coin Miner |
| Reference: | https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
| Rule name: | MAL_XMR_Miner_May19_1_RID2E1B |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Monero Crypto Coin Miner |
| Reference: | https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
| Rule name: | MINER_monero_mining_detection |
|---|---|
| Author: | Trellix ATR team |
| Description: | Monero mining software |
| Rule name: | PUA_Crypto_Mining_CommandLine_Indicators_Oct21 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects command line parameters often used by crypto mining software |
| Reference: | https://www.poolwatch.io/coin/monero |
| Rule name: | QbotStuff |
|---|---|
| Author: | anonymous |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SUSP_XMRIG_String |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a suspicious XMRIG crypto miner executable string in filr |
| Reference: | Internal Research |
| Rule name: | SUSP_XMRIG_String_RID2D18 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects a suspicious XMRIG crypto miner executable string in filr |
| Reference: | Internal Research |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Windows_Generic_Threat_fca7f863 |
|---|---|
| Author: | Elastic Security |
| Rule name: | XMRIG_Monero_Miner |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Monero mining software |
| Reference: | https://github.com/xmrig/xmrig/releases |
| Rule name: | XMRIG_Monero_Miner_RID2DC1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Monero mining software |
| Reference: | https://github.com/xmrig/xmrig/releases |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::CreateProcessA kernel32.dll::CloseHandle kernel32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | kernel32.dll::TerminateProcess kernel32.dll::GetStartupInfoA kernel32.dll::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | kernel32.dll::GetConsoleMode kernel32.dll::GetConsoleOutputCP kernel32.dll::GetConsoleCP |
| WIN_BASE_IO_API | Can Create Files | kernel32.dll::CopyFileA kernel32.dll::CreateFileW kernel32.dll::DeleteFileA kernel32.dll::MoveFileA kernel32.dll::FindFirstFileA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.