MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 41ad6f9aaac40ebe7d35ad9caa46ceafed790ca57d7c4e283fa87ce1892a088a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



1ms0rryMiner


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 1 File information Comments

SHA256 hash: 41ad6f9aaac40ebe7d35ad9caa46ceafed790ca57d7c4e283fa87ce1892a088a
SHA3-384 hash: c4859508d74d2dc04a698fccddf63cf4aaa61e29faa78edfdee1f994c9dfbcdbf6609f9b7aefc2a1ca41ae7c535773c2
SHA1 hash: 3b1fa2908150cc6a7d7764ee82ec37755984bba3
MD5 hash: b7468904155157b5f8cd9cb3782686de
humanhash: sink-white-harry-comet
File name:41AD6F9AAAC40EBE7D35AD9CAA46CEAFED790CA57D7C4.exe
Download: download sample
Signature 1ms0rryMiner
File size:3'602'257 bytes
First seen:2021-10-04 18:56:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:y9SA9IVfu8JcsQ05Dsw5C92bLLl2zgXsjOmpzRTUF6YKK8NSIxu:yafJF+SFRcOs+iK8NSIxu
Threatray 590 similar samples on MalwareBazaar
TLSH T129F533C7F49BDC66F1F00DB64B68C3CA353A2023904C5176BB3EA524DE1249F565AC6B
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:1ms0rryMiner exe


Avatar
abuse_ch
1ms0rryMiner C2:
185.244.217.195:21588

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.244.217.195:21588 https://threatfox.abuse.ch/ioc/230304/

Intelligence


File Origin
# of uploads :
1
# of downloads :
604
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 496707 Sample: 41AD6F9AAAC40EBE7D35AD9CAA4... Startdate: 04/10/2021 Architecture: WINDOWS Score: 100 81 149.154.167.99 TELEGRAMRU United Kingdom 2->81 83 116.203.245.137 HETZNER-ASDE Germany 2->83 85 4 other IPs or domains 2->85 129 Antivirus detection for URL or domain 2->129 131 Antivirus detection for dropped file 2->131 133 Multi AV Scanner detection for dropped file 2->133 135 13 other signatures 2->135 12 41AD6F9AAAC40EBE7D35AD9CAA46CEAFED790CA57D7C4.exe 10 2->12         started        signatures3 process4 file5 71 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->71 dropped 15 setup_installer.exe 16 12->15         started        process6 file7 73 C:\Users\user\AppData\...\setup_install.exe, PE32 15->73 dropped 75 C:\Users\user\AppData\...\Tue20b0ce91e160.exe, PE32+ 15->75 dropped 77 C:\Users\user\...\Tue2073e57b595420b4a.exe, PE32 15->77 dropped 79 11 other files (5 malicious) 15->79 dropped 18 setup_install.exe 1 15->18         started        process8 dnsIp9 87 127.0.0.1 unknown unknown 18->87 89 8.8.8.8 GOOGLEUS United States 18->89 91 172.67.142.91 CLOUDFLARENETUS United States 18->91 137 Adds a directory exclusion to Windows Defender 18->137 22 cmd.exe 18->22         started        24 cmd.exe 1 18->24         started        26 cmd.exe 18->26         started        28 7 other processes 18->28 signatures10 process11 signatures12 31 Tue20357017b9f2cf.exe 22->31         started        36 Tue206edc34cf4.exe 24->36         started        38 Tue206f1d53d40be40.exe 26->38         started        139 Adds a directory exclusion to Windows Defender 28->139 40 Tue2073e57b595420b4a.exe 28->40         started        42 Tue20b0ce91e160.exe 1 13 28->42         started        44 Tue200a01e55ccea5b.exe 28->44         started        46 3 other processes 28->46 process13 dnsIp14 93 37.0.10.214 WKD-ASIE Netherlands 31->93 101 11 other IPs or domains 31->101 59 C:\Users\...\lk7CBcPxNS6SnGB2cSYZrHsB.exe, PE32 31->59 dropped 61 C:\Users\...\gQatkQ3pXmYO4PHmQyR3rveI.exe, PE32 31->61 dropped 63 C:\Users\...\fcHSEZ6LZMIWGv3x5zt2DL7D.exe, PE32 31->63 dropped 67 29 other files (26 malicious) 31->67 dropped 107 Detected unpacking (creates a PE file in dynamic memory) 31->107 109 Drops PE files to the document folder of the user 31->109 111 Creates HTML files with .exe extension (expired dropper behavior) 31->111 113 Disable Windows Defender real time protection (registry) 31->113 48 _eBQutfPS1JqKd2xvXVLKTiY.exe 31->48         started        115 Machine Learning detection for dropped file 36->115 117 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 36->117 119 Maps a DLL or memory area into another process 36->119 121 Checks if the current machine is a virtual machine (disk enumeration) 36->121 51 explorer.exe 36->51 injected 103 2 other IPs or domains 38->103 123 Antivirus detection for dropped file 38->123 125 Detected unpacking (overwrites its own PE header) 38->125 95 162.159.130.233 CLOUDFLARENETUS United States 40->95 105 4 other IPs or domains 42->105 65 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 42->65 dropped 127 Tries to harvest and steal browser information (history, passwords, etc) 42->127 97 74.114.154.18 AUTOMATTICUS Canada 44->97 53 WerFault.exe 44->53         started        99 185.92.73.84 FOXCLOUDNL Netherlands 46->99 55 Tue202c0b0c44.exe 46->55         started        file15 signatures16 process17 file18 69 C:\Users\...\pidHTSIGEi8DrAmaYu9K8ghN89.dll, PE32+ 48->69 dropped 57 conhost.exe 55->57         started        process19
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-08-25 07:55:02 UTC
AV detection:
24 of 27 (88.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:arkei family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:903 botnet:pub2 botnet:�#w;ef�b\ �����+k)џ�d��b`~6�2�2g�1�-� aspackv2 backdoor evasion infostealer stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Program crash
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Arkei Stealer Payload
Vidar Stealer
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
Arkei
Modifies Windows Defender Real-time Protection settings
Malware Config
C2 Extraction:
185.92.73.84:80
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
http://fiskahlilian16.top/
http://paishancho17.top/
http://ydiannetter18.top/
http://azarehanelle19.top/
http://quericeriant20.top/
https://mas.to/@bardak1ho
Unpacked files
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
9b5923d26248adde4546d4421275f7b0ac36e4e2c4af232d367563bca7cf5209
MD5 hash:
3093c62cf5c8c754576a62c8d173b11c
SHA1 hash:
468210c7bc85627a27a2b10da0580c119e0ec3d8
SH256 hash:
59c8b228088a6a89dfd12a9f2ee3b4b35ba5c11d22917e4794c8c40f607ccf12
MD5 hash:
594093a4765e2444ce9f5b064dc857ef
SHA1 hash:
32e65e3bf804a2abfa94281933fd5b5a0d23a30d
SH256 hash:
771879a5daba9c1534171c0c3179008c0fde3629582b4c9412a10ee2d50b627a
MD5 hash:
ae0845f56193eedc564b4a1bf6bb3b74
SHA1 hash:
119c61acd1499c1e06409a9405c0605f92255764
SH256 hash:
278ce0db727c32d568a46edb187a66470e43a23e7c4088132121b12262a5e9ed
MD5 hash:
4f6b98cc3d67e1e733c1389aea94759f
SHA1 hash:
bbb97138a3bcde05e54459c6a800a663a4126501
SH256 hash:
0b3987d9740362c3dcc3cafb211b11d0ac16a0af8d9bd598a01398d66d1a6828
MD5 hash:
bfed33927237754d7bd01ea51e7ee20a
SHA1 hash:
b952608b926b1bb79122e5ed2b0344b7e7e95d0e
SH256 hash:
785f25b675bf841ef74c654869148a7a52043dc4f0a9b47411d56a7a653acfbc
MD5 hash:
c2845189a6070d89ce34799753823b63
SHA1 hash:
95cc359e043d7aa6b32e1b5f02bfeda413c6aac2
SH256 hash:
26b4131342f185c4eff5c1b16a8ac18201300471e60be7cc043a6d0a6b1a53c4
MD5 hash:
0982f95eac01757497019012a7e8b74e
SHA1 hash:
7a88da3eb10bd607fb2733752e5568ae3572089d
SH256 hash:
05942fe67632d7cb440fd1f31bd55cfc8416bdab4da6ed8d84e8d3fd16c3f5d6
MD5 hash:
5fbf56cf05175a08ebbfd3ab8c29ab9e
SHA1 hash:
7412ee83a7568b1f6024ba4e1277e298d76e8738
SH256 hash:
b175eac759c3d3cacc3d9cbca20f54e7c59fa98f9257a5e5550de2166e4435c8
MD5 hash:
f3aa15d012c66e484fe515318d134e70
SHA1 hash:
6cfdcc179a9c79e47cfce8862a9729607ea575e1
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
264fb49a62104998f65783ed312d7cd4e9ca30f7badbc4833aeaaedf360e99fe
MD5 hash:
60858f395dcaf00d2b0a208ad2d854bb
SHA1 hash:
97d5eb7ac9410e2b815144ea31289a0fae63dcb4
SH256 hash:
8800de2aa541b5be0107e8fd2d2ad40cca325f0ef1e4d1e3d100d90234d518be
MD5 hash:
69e51dca35ae1ac510b68d3faa541892
SHA1 hash:
bc1b7006525d715525caf195ad0ff4bb26cf18b4
SH256 hash:
ad7d1056e55068a0e612467c044d77a7cd6afac343e782517faf779b205e4f3a
MD5 hash:
c38194adbf3765df405035fefb0e8105
SHA1 hash:
5f583d5f001f3f5a72187acf2cd660e93491d7c8
SH256 hash:
41ad6f9aaac40ebe7d35ad9caa46ceafed790ca57d7c4e283fa87ce1892a088a
MD5 hash:
b7468904155157b5f8cd9cb3782686de
SHA1 hash:
3b1fa2908150cc6a7d7764ee82ec37755984bba3
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments