MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 479579cc0f9ecdbcdb6d8df674940a411a0fdaa9ab66fc87db6a24658f979204. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 479579cc0f9ecdbcdb6d8df674940a411a0fdaa9ab66fc87db6a24658f979204
SHA3-384 hash: 2277e78b8b82cc9beb78e6d1307bcb5f044a761e5130de499d2598c6aef48b94896f54a49a8446e8bd668e8be4cf023e
SHA1 hash: 516bbca9d82ae9e8d35a5120cf16b95d87a8c35a
MD5 hash: eb9f90fdaf8f78ff76132098d17fd0bd
humanhash: may-iowa-spaghetti-low
File name:eb9f90fdaf8f78ff76132098d17fd0bd
Download: download sample
Signature CoinMiner
File size:46'592 bytes
First seen:2021-07-23 19:06:14 UTC
Last seen:2021-07-23 20:00:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 768:viFHk+VUnAiZ3TIE4vXx048ZbNMdfHvPnm9fzqCHX/Wzwlc1:2VEAiZM3x0NZiNPPnUP41
Threatray 11 similar samples on MalwareBazaar
TLSH T16C23E185F79AD5A8ECF30DBD3D9556B2217ADBC38813CA1C6500DA06DED33878613A71
dhash icon 0cd2c0c4d0c1f20c (1 x CoinMiner, 1 x RecordBreaker)
Reporter zbetcheckin
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
188
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
eb9f90fdaf8f78ff76132098d17fd0bd
Verdict:
No threats detected
Analysis date:
2021-07-23 19:09:28 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Connects to a pastebin service (likely for C&C)
DNS related to crypt mining pools
Drops PE files with benign system names
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 453433 Sample: 4HoFnQosUb Startdate: 23/07/2021 Architecture: WINDOWS Score: 100 88 Malicious sample detected (through community Yara rule) 2->88 90 Multi AV Scanner detection for submitted file 2->90 92 Yara detected Xmrig cryptocurrency miner 2->92 94 6 other signatures 2->94 8 4HoFnQosUb.exe 6 2->8         started        12 Services.exe 4 2->12         started        15 svchost.exe 2->15         started        17 svchost.exe 2->17         started        process3 dnsIp4 52 C:\Users\user\AppData\Local\...\Services.exe, PE32+ 8->52 dropped 54 C:\Users\...\Services.exe:Zone.Identifier, ASCII 8->54 dropped 56 C:\Users\user\AppData\...\4HoFnQosUb.exe.log, ASCII 8->56 dropped 110 Drops PE files with benign system names 8->110 19 Services.exe 14 7 8->19         started        24 cmd.exe 1 8->24         started        74 185.199.111.133, 443, 49727 FASTLYUS Netherlands 12->74 76 sanctam.net 12->76 80 2 other IPs or domains 12->80 58 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 12->58 dropped 60 C:\Users\user\AppData\...\sihost64.log, DOS 12->60 dropped 112 Injects code into the Windows Explorer (explorer.exe) 12->112 114 Writes to foreign memory regions 12->114 116 Allocates memory in foreign processes 12->116 118 3 other signatures 12->118 26 explorer.exe 12->26         started        28 cmd.exe 1 12->28         started        78 127.0.0.1 unknown unknown 15->78 file5 signatures6 process7 dnsIp8 62 github.com 140.82.121.4, 443, 49724, 49726 GITHUBUS United States 19->62 64 raw.githubusercontent.com 185.199.108.133, 443, 49725 FASTLYUS Netherlands 19->64 66 sanctam.net 185.65.135.248, 49721, 49723, 58899 ESAB-ASSE Sweden 19->66 50 C:\Users\user\AppData\...\sihost64.exe, PE32+ 19->50 dropped 96 Multi AV Scanner detection for dropped file 19->96 98 Machine Learning detection for dropped file 19->98 100 Injects code into the Windows Explorer (explorer.exe) 19->100 108 4 other signatures 19->108 30 explorer.exe 19->30         started        34 cmd.exe 1 19->34         started        36 sihost64.exe 3 19->36         started        102 Uses schtasks.exe or at.exe to add and modify task schedules 24->102 38 conhost.exe 24->38         started        40 schtasks.exe 1 24->40         started        68 144.217.14.139, 14433, 49736 OVHFR Canada 26->68 70 104.23.99.190, 443, 49735 CLOUDFLARENETUS United States 26->70 72 2 other IPs or domains 26->72 104 System process connects to network (likely due to code injection or exploit) 26->104 106 Query firmware table information (likely to detect VMs) 26->106 42 conhost.exe 28->42         started        44 schtasks.exe 1 28->44         started        file9 signatures10 process11 dnsIp12 82 xmr-us-east1.nanopool.org 142.44.242.100, 14433, 49734 OVHFR Canada 30->82 84 pastebin.com 104.23.98.190, 443, 49733 CLOUDFLARENETUS United States 30->84 86 192.168.2.1 unknown unknown 30->86 120 System process connects to network (likely due to code injection or exploit) 30->120 122 Query firmware table information (likely to detect VMs) 30->122 124 Tries to detect sandboxes and other dynamic analysis tools (window names) 30->124 46 conhost.exe 34->46         started        48 schtasks.exe 1 34->48         started        signatures13 process14
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-07-23 19:07:07 UTC
AV detection:
11 of 46 (23.91%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Executes dropped EXE
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
479579cc0f9ecdbcdb6d8df674940a411a0fdaa9ab66fc87db6a24658f979204
MD5 hash:
eb9f90fdaf8f78ff76132098d17fd0bd
SHA1 hash:
516bbca9d82ae9e8d35a5120cf16b95d87a8c35a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 479579cc0f9ecdbcdb6d8df674940a411a0fdaa9ab66fc87db6a24658f979204

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-23 19:06:15 UTC

url : hxxp://45.144.225.135/conhost.exe