MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 34ab005b549534dba9a83d9346e1618a18ecee2c99a93079551634f9480b2b79. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 34ab005b549534dba9a83d9346e1618a18ecee2c99a93079551634f9480b2b79
SHA3-384 hash: 7e0146d849e0e25f3e69d6294ee3c714b8851c985821cf256908005a5f33712aa0ada18dd20efe3b69727719321588dc
SHA1 hash: 247b5c812136a40f85c106ca6441315b123f625e
MD5 hash: f9e4ae00290e5259c78ba11b4c851417
humanhash: vegan-twenty-freddie-november
File name:GXBuilder.exe
Download: download sample
Signature CoinMiner
File size:13'190'144 bytes
First seen:2024-01-22 20:33:07 UTC
Last seen:2024-04-27 07:03:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6f462fcc6b830b77fb3fef2add9dc570 (9 x CoinMiner, 3 x BitRAT, 2 x XWorm)
ssdeep 196608:/i76SDEa0mOCb5xm4J15iY5XBx9vjnWmf58eOt6dp2wGSECksB579u5gnynV:/imJa0mN/p1599vjnXVd9pl5Ggn
Threatray 173 similar samples on MalwareBazaar
TLSH T1F0D6330E6A4E07D4E6FA77319FA8C87407C15D7A504D79D50CF08CA77EE916BA320A2B
TrID 38.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
11.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4505/5/1)
4.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter e24111111111111
Tags:CoinMiner Crysan exe PureCrypt XenoRAT zgRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
375
Origin country :
GR GR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
GXImageLogger.zip
Verdict:
Malicious activity
Analysis date:
2024-01-20 11:18:44 UTC
Tags:
xenorat rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the %AppData% directory
Creating a file
Deleting a system file
Running batch commands
Unauthorized injection to a recently created process
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
XenoRAT, Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Creates files with lurking names (e.g. Crack.exe)
Encrypted powershell cmdline option found
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Potential dropper URLs found in powershell memory
Sample is not signed and drops a device driver
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected XenoRAT
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1379065 Sample: GXBuilder.exe Startdate: 22/01/2024 Architecture: WINDOWS Score: 100 103 time.windows.com 2->103 105 jctestwindows.airdns.org 2->105 124 Snort IDS alert for network traffic 2->124 126 Antivirus detection for URL or domain 2->126 128 Antivirus / Scanner detection for submitted sample 2->128 130 9 other signatures 2->130 10 GXBuilder.exe 5 2->10         started        14 bauwrdgwodhv.exe 2->14         started        16 svchost.exe 2->16         started        18 8 other processes 2->18 signatures3 process4 dnsIp5 91 C:\Users\user\AppData\...\KeyGeneratorTOP.exe, PE32+ 10->91 dropped 93 C:\Users\user\AppData\...\WinHostMgr.exe, PE32+ 10->93 dropped 95 C:\Users\user\AppData\...\WinErrorMgr.exe, PE32 10->95 dropped 97 C:\Users\user\AppData\Local\Temp\Ilkdt.exe, PE32 10->97 dropped 144 Encrypted powershell cmdline option found 10->144 146 Creates files with lurking names (e.g. Crack.exe) 10->146 21 KeyGeneratorTOP.exe 13 10->21         started        24 WinHostMgr.exe 1 2 10->24         started        27 WinErrorMgr.exe 4 10->27         started        37 2 other processes 10->37 99 C:\Windows\Temp\qdvyclnkfmuh.sys, PE32+ 14->99 dropped 148 Antivirus detection for dropped file 14->148 150 Multi AV Scanner detection for dropped file 14->150 152 Injects code into the Windows Explorer (explorer.exe) 14->152 156 3 other signatures 14->156 29 cmd.exe 14->29         started        31 powershell.exe 14->31         started        33 sc.exe 14->33         started        35 sc.exe 14->35         started        154 Changes security center settings (notifications, updates, antivirus, firewall) 16->154 107 127.0.0.1 unknown unknown 18->107 file6 signatures7 process8 file9 79 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 21->79 dropped 81 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 21->81 dropped 83 C:\Users\user\AppData\Local\...\python312.dll, PE32+ 21->83 dropped 89 7 other malicious files 21->89 dropped 39 KeyGeneratorTOP.exe 21->39         started        41 conhost.exe 21->41         started        85 C:\ProgramData\...\bauwrdgwodhv.exe, PE32+ 24->85 dropped 132 Antivirus detection for dropped file 24->132 134 Multi AV Scanner detection for dropped file 24->134 136 Uses powercfg.exe to modify the power settings 24->136 142 2 other signatures 24->142 56 15 other processes 24->56 87 C:\Users\user\AppData\...\WinErrorMgr.exe, PE32 27->87 dropped 43 WinErrorMgr.exe 5 27->43         started        58 2 other processes 29->58 48 conhost.exe 31->48         started        50 conhost.exe 33->50         started        52 conhost.exe 35->52         started        138 Machine Learning detection for dropped file 37->138 140 Potential dropper URLs found in powershell memory 37->140 54 conhost.exe 37->54         started        signatures10 process11 dnsIp12 60 chrome.exe 39->60         started        116 jctestwindows.airdns.org 185.104.184.43, 45010 M247GB United Kingdom 43->116 101 C:\Users\user\AppData\Local\...\tmp5E7D.tmp, ASCII 43->101 dropped 158 Antivirus detection for dropped file 43->158 160 Multi AV Scanner detection for dropped file 43->160 162 Uses schtasks.exe or at.exe to add and modify task schedules 43->162 63 schtasks.exe 43->63         started        65 wusa.exe 56->65         started        68 conhost.exe 56->68         started        70 conhost.exe 56->70         started        72 13 other processes 56->72 file13 signatures14 process15 dnsIp16 118 192.168.2.7, 1123, 138, 443 unknown unknown 60->118 120 239.255.255.250 unknown Reserved 60->120 74 chrome.exe 60->74         started        77 conhost.exe 63->77         started        122 Adds a directory exclusion to Windows Defender 65->122 signatures17 process18 dnsIp19 109 pogothere.xyz 74->109 112 ihavelearnat.xyz 74->112 114 20 other IPs or domains 74->114 signatures20 164 Performs DNS queries to domains with low reputation 112->164
Threat name:
Win32.Trojan.Nekark
Status:
Malicious
First seen:
2024-01-10 07:09:52 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat evasion persistence pyinstaller rat
Behaviour
Creates scheduled task(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Enumerates physical storage devices
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Creates new service(s)
Stops running service(s)
Detect ZGRat V1
ZGRat
Unpacked files
SH256 hash:
7cae509e975b80307e06568b3c1ee1d1bee72c0b4bac104dccac1455ab4e19eb
MD5 hash:
fd01efbfead9b5db6fffa1f56bad04c3
SHA1 hash:
19f236dab1daf7c49f11c5fb55cc5d3edd4c56fe
SH256 hash:
d49013d6be0f0e727c0b53bce1d3fed00656c7a2836ceef0a9d4cb816a5878db
MD5 hash:
e004a568b841c74855f1a8a5d43096c7
SHA1 hash:
b90fd74593ae9b5a48cb165b6d7602507e1aeca4
SH256 hash:
bc3d545c541e42420ce2c2eabc7e5afab32c869a1adb20adb11735957d0d0b0e
MD5 hash:
d499e979a50c958f1a67f0e2a28af43d
SHA1 hash:
1e5fa0824554c31f19ce01a51edb9bed86f67cf0
SH256 hash:
34ab005b549534dba9a83d9346e1618a18ecee2c99a93079551634f9480b2b79
MD5 hash:
f9e4ae00290e5259c78ba11b4c851417
SHA1 hash:
247b5c812136a40f85c106ca6441315b123f625e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments