MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f3ce1f91c8f439a2c903fa08544b08e21704a53c3ab260d3a0b8d3dea425020. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments 1

SHA256 hash: 3f3ce1f91c8f439a2c903fa08544b08e21704a53c3ab260d3a0b8d3dea425020
SHA3-384 hash: 8feac7e84bed0078ef4c4c4764b25c646c6a5397acd6b2ebe7204840108ba6eaa3a7b9072c1025ba1930d13006076095
SHA1 hash: 62bcde8f6c592a4be16b0d0feeb5fa2df13b0619
MD5 hash: 117e4e3f1b6edae6745f82cf072008f1
humanhash: fruit-tennis-asparagus-happy
File name:117E4E3F1B6EDAE6745F82CF072008F1.exe
Download: download sample
Signature CoinMiner
File size:1'081'282 bytes
First seen:2021-05-06 20:46:42 UTC
Last seen:2021-05-06 21:01:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a1a66d588dcf1394354ebf6ec400c223 (49 x RedLineStealer, 7 x CryptBot, 4 x AZORult)
ssdeep 24576:o1qUujZ3P+kMUTeGfspVGx2HMv87d6Iosk/8K/rEkfI1glO:o1qUu932k5TVsHGxcl7zhMoNz
Threatray 152 similar samples on MalwareBazaar
TLSH 5D3523203AD380FBCAB23AB06D11734A65FBFA350F0A8AD35B50150B5E585C59BFD6D2
Reporter abuse_ch
Tags:CoinMiner exe


Avatar
abuse_ch
CoinMiner C2:
45.128.150.47:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.128.150.47:80 https://threatfox.abuse.ch/ioc/30618/

Intelligence


File Origin
# of uploads :
2
# of downloads :
325
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://www.thecrackbox.com/save-wizard-ps4-free-download/
Verdict:
Malicious activity
Analysis date:
2021-05-04 05:50:33 UTC
Tags:
autoit trojan rat redline phishing opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
64 / 100
Signature
Contains functionality to register a low level keyboard hook
Multi AV Scanner detection for submitted file
Obfuscated command line found
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 406344 Sample: bsvL2B6U0P.exe Startdate: 06/05/2021 Architecture: WINDOWS Score: 64 36 Multi AV Scanner detection for submitted file 2->36 9 bsvL2B6U0P.exe 7 2->9         started        process3 signatures4 38 Contains functionality to register a low level keyboard hook 9->38 12 cmd.exe 1 9->12         started        process5 signatures6 40 Submitted sample is a known malware sample 12->40 42 Obfuscated command line found 12->42 44 Uses ping.exe to sleep 12->44 46 Uses ping.exe to check the status of other devices and networks 12->46 15 cmd.exe 3 12->15         started        18 conhost.exe 12->18         started        process7 signatures8 48 Obfuscated command line found 15->48 50 Uses ping.exe to sleep 15->50 20 PING.EXE 1 15->20         started        23 Sta.exe.com 15->23         started        25 findstr.exe 1 15->25         started        process9 dnsIp10 30 127.0.0.1 unknown unknown 20->30 32 192.168.2.1 unknown unknown 20->32 27 Sta.exe.com 23->27         started        process11 dnsIp12 34 qnrBjIxlRPygUQEBOnj.qnrBjIxlRPygUQEBOnj 27->34
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2021-05-04 02:12:00 UTC
AV detection:
11 of 29 (37.93%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:9874 discovery infostealer persistence spyware stealer
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
nshoreyle.xyz:80
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-06 21:01:42 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [F0002.001] Collection::Application Hook
1) [F0002.002] Collection::Polling
2) [C0029.003] Cryptography Micro-objective::SHA256::Cryptographic Hash
3) [C0032.001] Data Micro-objective::CRC32::Checksum
4) [C0026.002] Data Micro-objective::XOR::Encode Data
6) [C0046] File System Micro-objective::Create Directory
7) [C0048] File System Micro-objective::Delete Directory
8) [C0047] File System Micro-objective::Delete File
9) [C0049] File System Micro-objective::Get File Attributes
10) [C0051] File System Micro-objective::Read File
11) [C0050] File System Micro-objective::Set File Attributes
12) [C0052] File System Micro-objective::Writes File
13) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
14) [C0017] Process Micro-objective::Create Process
15) [C0038] Process Micro-objective::Create Thread
16) [C0054] Process Micro-objective::Resume Thread
17) [C0018] Process Micro-objective::Terminate Process