MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f947f5a849f11be9079a5c2418240e2faf7e53b63662c85b92fad8f47ea4d09. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner.XMRig


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 14 File information Comments

SHA256 hash: 3f947f5a849f11be9079a5c2418240e2faf7e53b63662c85b92fad8f47ea4d09
SHA3-384 hash: 29c72e5d10148c93bbbfb8eff50ccf791348bd82eba6a206cd6a5127f7a48462a19094b47a54408fd11c0ac13687d465
SHA1 hash: 24063f28fa7dee0e0c54236bac0ab6d9a5b1e31f
MD5 hash: 49849ea730c690df970bb542dbd18e95
humanhash: edward-violet-magazine-high
File name:3F947F5A849F11BE9079A5C2418240E2FAF7E53B63662.exe
Download: download sample
Signature CoinMiner.XMRig
File size:8'194'852 bytes
First seen:2022-06-25 16:44:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JWLqEnZMIImZP/6N+ylO9MOchY35XhF35oTGxUh:J4qIZRImpCoyI35XhFpE0Uh
TLSH T1018633954BEB6046D73CBA7629E3DE294F0134218529AD720361ABC0E47D6533CBE1FB
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:CoinMiner.XMRig exe


Avatar
abuse_ch
CoinMiner.XMRig C2:
89.22.235.145:36055

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
89.22.235.145:36055 https://threatfox.abuse.ch/ioc/728280/
http://acacaca.org/test3/get.php https://threatfox.abuse.ch/ioc/728281/

Intelligence


File Origin
# of uploads :
1
# of downloads :
280
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Creating a window
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Sending an HTTP GET request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
60%
Tags:
chrome mokes
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nymaim, PrivateLoader, RedLine, Socelars
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Creates HTML files with .exe extension (expired dropper behavior)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected MSILDownloaderGeneric
Yara detected Nymaim
Yara detected onlyLogger
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 652291 Sample: 3F947F5A849F11BE9079A5C2418... Startdate: 25/06/2022 Architecture: WINDOWS Score: 100 91 www.hhiuew33.com 2->91 93 rgyui.top 2->93 95 10 other IPs or domains 2->95 123 Snort IDS alert for network traffic 2->123 125 Multi AV Scanner detection for domain / URL 2->125 127 Malicious sample detected (through community Yara rule) 2->127 129 26 other signatures 2->129 11 3F947F5A849F11BE9079A5C2418240E2FAF7E53B63662.exe 10 2->11         started        14 svchost.exe 2->14         started        17 svchost.exe 2->17         started        19 7 other processes 2->19 signatures3 process4 dnsIp5 77 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->77 dropped 22 setup_installer.exe 24 11->22         started        139 Changes security center settings (notifications, updates, antivirus, firewall) 14->139 25 WerFault.exe 17->25         started        27 WerFault.exe 17->27         started        29 WerFault.exe 17->29         started        99 127.0.0.1 unknown unknown 19->99 file6 signatures7 process8 file9 69 C:\Users\user\AppData\...\setup_install.exe, PE32 22->69 dropped 71 C:\Users\user\AppData\...\Sat21dad62895f.exe, PE32 22->71 dropped 73 C:\Users\user\AppData\...\Sat21c50f382c.exe, PE32 22->73 dropped 75 19 other files (7 malicious) 22->75 dropped 31 setup_install.exe 1 22->31         started        process10 dnsIp11 115 raitanori.xyz 31->115 117 Performs DNS queries to domains with low reputation 31->117 119 Adds a directory exclusion to Windows Defender 31->119 121 Disables Windows Defender (via service or powershell) 31->121 35 cmd.exe 31->35         started        37 cmd.exe 31->37         started        39 cmd.exe 31->39         started        41 16 other processes 31->41 signatures12 process13 signatures14 44 Sat213bfa938b854.exe 35->44         started        49 Sat2187d10982.exe 37->49         started        51 Sat2151e2a470f.exe 39->51         started        131 Adds a directory exclusion to Windows Defender 41->131 133 Disables Windows Defender (via service or powershell) 41->133 53 Sat2139c6e21283.exe 41->53         started        55 Sat21236d0487254d.exe 41->55         started        57 Sat21dad62895f.exe 41->57         started        59 12 other processes 41->59 process15 dnsIp16 101 185.215.113.15, 49802, 49842, 80 WHOLESALECONNECTIONSNL Portugal 44->101 103 212.193.30.45, 49743, 49760, 49795 SPD-NETTR Russian Federation 44->103 107 11 other IPs or domains 44->107 79 C:\Users\...\tQHQy9w9PgIfI3viZ0LS_89g.exe, PE32 44->79 dropped 81 C:\Users\user\AppData\Local\...\wam[1].exe, PE32+ 44->81 dropped 83 C:\Users\user\AppData\Local\...\file3[1].exe, PE32 44->83 dropped 89 29 other files (10 malicious) 44->89 dropped 141 Antivirus detection for dropped file 44->141 143 May check the online IP address of the machine 44->143 145 Creates HTML files with .exe extension (expired dropper behavior) 44->145 155 2 other signatures 44->155 109 3 other IPs or domains 49->109 85 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 49->85 dropped 61 11111.exe 49->61         started        111 2 other IPs or domains 51->111 147 Machine Learning detection for dropped file 51->147 64 WerFault.exe 51->64         started        149 Injects a PE file into a foreign processes 53->149 151 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 53->151 66 Sat2139c6e21283.exe 53->66         started        113 3 other IPs or domains 55->113 153 Sample uses process hollowing technique 57->153 105 162.159.134.233, 443, 49766, 49773 CLOUDFLARENETUS United States 59->105 87 C:\Users\user\...\Sat21ef51d9d1acdcc.tmp, PE32 59->87 dropped file17 signatures18 process19 dnsIp20 135 Machine Learning detection for dropped file 61->135 137 Tries to harvest and steal browser information (history, passwords, etc) 61->137 97 ad-postback.biz 66->97 signatures21
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2021-12-19 00:44:54 UTC
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:asyncrat family:djvu family:onlylogger family:recordbreaker family:redline family:socelars family:vidar botnet:3333 botnet:915 botnet:arrowrat clients botnet:media19n botnet:v3user1 aspackv2 discovery evasion infostealer loader persistence ransomware rat spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Enumerates processes with tasklist
Kills process with taskkill
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Launches sc.exe
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Maps connected drives based on registry
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Windows security modification
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Looks for VMWare Tools registry key
Modifies Windows Firewall
Async RAT payload
Looks for VirtualBox Guest Additions in registry
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger Payload
Vidar Stealer
Amadey
AsyncRat
Detected Djvu ransomware
Djvu Ransomware
Modifies Windows Defender Real-time Protection settings
OnlyLogger
Process spawned unexpected child process
RecordBreaker
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Windows security bypass
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download
suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
https://noc.social/@sergeev46
https://c.im/@sergeev47
159.69.246.184:13127
65.108.69.168:13293
127.0.0.1:4444
188.212.124.129:4444
pingo3000.hopto.org:4444
http://acacaca.org/test3/get.php
89.22.235.145:36055
Unpacked files
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
Detections:
win_smokeloader_a2
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
4bf0756514a69818a31ef647b80cef858ce266e98f63d583e8c6bc87b36ff272
MD5 hash:
4f17116091ca667f6e4f9940f04355ac
SHA1 hash:
9c9d7d8a8d9e96a5527df8f4cf40bb5f8928416b
SH256 hash:
261a5f21ad2b9cec0d472036be7d5f3921d0c7b255bde407f93d901468cdfcd3
MD5 hash:
519cd12c49bfc542b6a7d46092b867d4
SHA1 hash:
df1064b87534ac0c904d7257260b39f8d32f4c29
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
e7b8877389f0bfb5fb95f08a799a0e7d06a2f7161a0287552ff3eadf06bd1dd1
MD5 hash:
e9eb471509abbfb4456285e82b25d1c9
SHA1 hash:
b96ef576c147ea8a1b3e0bd5430117ba9ad31096
SH256 hash:
6dde298142e8abbc4a1e61db8560916d3c6d237b27b19b1598984f18f66450cf
MD5 hash:
6e977a83d8cb9984735f1418f6cfb325
SHA1 hash:
eb8f08a52d09a23a81591fd73653e551d1245732
SH256 hash:
d5ad93e7e6ad0fc510007ed546fc180b415c01e34aa8a77044e7bcec974692b1
MD5 hash:
ce7909e9881bdc83f3a3b074295f5a92
SHA1 hash:
e9071520355aca4faf26c0d7d5888a4299e095c6
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
dcc1725b855ec8f21f1a78a72bc3951682a20709b129d16051cbbbfca2361c2a
MD5 hash:
851857aa313098b41716720126d1e9e1
SHA1 hash:
748d3a025f04a0526678af71a341097570c88e7e
SH256 hash:
3f3415770fbca4d42cae3ff5cdf8195fd82e45dc17cddecd07800e6f2ad0a5af
MD5 hash:
92601eceaab45cff04a37388dab35e09
SHA1 hash:
5031f2f99a2a8c5139ae13f1cd48b41609a03c16
SH256 hash:
2830e312cb7f4cb034f0eed3315edd56488581866bd39cb21b5694a85823277e
MD5 hash:
6d71b0d427ab802b8eec2555e7f60bf7
SHA1 hash:
4e8d784b8f2e0f9ed0d18ffa275ad9ec7c9ba3cd
SH256 hash:
965cf567cba9d1f69cef946ee8db059228e0ef95a23c507dcfa09fe13ff1c493
MD5 hash:
8bb331b59d9ad2bc9d965374cbf9493c
SHA1 hash:
484e93c5806bb33c687f2af5dfab5a52b0480f92
SH256 hash:
7e9ba586d109dd87c0b7cf6142f1572bc9587ce569c2375ab4b3e643a67ecae0
MD5 hash:
fa80ea1d6fde30d9d229d94c6f46afcd
SHA1 hash:
404e988f9abb067ffa32a2e9e891298746f952d9
SH256 hash:
635645f350f03b82f2bc3f6e2f0cfc5cd1d48a8ed6396958b05bbf23f6d95863
MD5 hash:
9834afc986270e4ce1a2341764be6d30
SHA1 hash:
2e331874ff8c2ea39c2b2da8c7aa9075cd64c494
SH256 hash:
e2123768c3d66aedee7f8c8cc91b635c406ed029fd4c16da74431358f78deb13
MD5 hash:
a4420eeac8c83f9996162d668ca8528a
SHA1 hash:
2c5c481057968f723f419225fb6242b2df4f66de
SH256 hash:
31c3da442c71da87647420a22b99744c6634a91d4f7724e14fa525db7aba0b42
MD5 hash:
68cb86890fc8bd08dcf123b12487dd9b
SHA1 hash:
26472e80f39575dc30b7b2ca21024e83de23f12d
SH256 hash:
f58f2154e5d75dd06c1666f6b3cbe17b32ce6c8779f72626d01574e6c3a1b386
MD5 hash:
a6658c56eb3c41765abbd12cdeee21f4
SHA1 hash:
243bfd8dcf97b2f2c5ad4710017ed296f8a70125
SH256 hash:
f45daafd61371b1f080a92eea8e9c8bfc9b710f22c82d5a06a1b1bf271c646ad
MD5 hash:
7e32ef0bd7899fa465bb0bc866b21560
SHA1 hash:
115d09eeaff6bae686263d57b6069dd41f63c80c
SH256 hash:
a6fe15069a6ea98b42471503e427375cdf14b92fd6bf6f69a21dbe2e1a675c98
MD5 hash:
26f0fa618a849f4c2c8a054bb41583d2
SHA1 hash:
2d34f74fafe0c0042e567858ed8a8601ce250d14
Detections:
win_vidar_auto
SH256 hash:
ebcfce073e8cb830630da06b772b97cfdbd17a9814849be9fcaecb617ec80229
MD5 hash:
352493f35ca899281c205eeccb22b231
SHA1 hash:
75a48f4cca4041c2dbd796efbd9ca41fadc401a9
SH256 hash:
e42af551dea9b76b6d9b35526265e1520a3d0ac78524eb4d326063c7233e11fe
MD5 hash:
d59d12750ef77beacfc5f23253dd42ef
SHA1 hash:
18229ca4e442987b174771e03fb311f52443925e
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
9e605375c7ac7f5b0055156dc82867b3f844897c5faeb2d95db7262365d78ca3
MD5 hash:
c92a03e2504086f371062521e7b90112
SHA1 hash:
ec7a3a21e343abb5ee555a38cb8737d01e4916de
SH256 hash:
f6404af768f203419c9bfdb0bf7197978b2209d08e70ec835c8e1c89bc1316dc
MD5 hash:
5e05981a4de7df87a1c4f27bca479744
SHA1 hash:
61657e8478b97a15031e9a4f92088df22d2e6499
SH256 hash:
9683db3027050d4be59a9c6a7e98e69fc5fe960cd717aaacdabf44866046de1c
MD5 hash:
594c33622b29ab4faa2a103502a4d724
SHA1 hash:
e56128b968cdbfbe4a4b2d7c601d808ddd5e5aa6
SH256 hash:
be30d67376f9b274d5c495c339428f296abb3f9b932ff4fe66d26f544e2e1212
MD5 hash:
ce5c58413fe3b64b960b98d9d824aacb
SHA1 hash:
e6179f8b7aa462141f7df35be724f8729b41213b
SH256 hash:
f615c17111d14e44fc1c98c3db8652ace89065ed68e0c0d94f71f56c39afba8b
MD5 hash:
e5bf00f09a8118f790f7aa7d0b7fba2b
SHA1 hash:
7df326221d9ceb9ada307a5c26107f8e32ec010b
SH256 hash:
3f947f5a849f11be9079a5c2418240e2faf7e53b63662c85b92fad8f47ea4d09
MD5 hash:
49849ea730c690df970bb542dbd18e95
SHA1 hash:
24063f28fa7dee0e0c54236bac0ab6d9a5b1e31f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:privateloader
Author:andre@tavares.re
Description:PrivateLoader pay-per-install malware
Rule name:Redline_Stealer_Monitor
Description:Detects RedLine Stealer Variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_privateloader
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments