MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4a2c3f7e489652350d3fd9df4259c52e2a9be9eb507d011779079d1e57e0301d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: 4a2c3f7e489652350d3fd9df4259c52e2a9be9eb507d011779079d1e57e0301d
SHA3-384 hash: 2717d051aa292e1bc4be2b43b9947b8711864e946e639caf0b76feebd0be571db07255c9625cf3d4e09badff0ac74685
SHA1 hash: 9ad15498c9c077a7b9fa840b7352567b5405f1e3
MD5 hash: 2b5ae81b913c18c43d45742837f4b7f7
humanhash: north-shade-mexico-island
File name:Lunar Builder.exe
Download: download sample
Signature CoinMiner
File size:12'918'784 bytes
First seen:2021-11-15 18:47:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'597 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 393216:K1rx5n7OhVBJlPxKxxf/DVyY51ythaSZ3eTKT9INk:K1rj7OhV/nwxHDV5qYSZ3xT
Threatray 308 similar samples on MalwareBazaar
TLSH T103D633686F94C748F3822774E8F3A5423339A7BC5A1E99C4E4093F7D36A2D151FC1A62
File icon (PE):PE icon
dhash icon f088ac568cdcf0f0 (1 x Nitro, 1 x CoinMiner, 1 x GandCrab)
Reporter tech_skeech
Tags:CoinMiner.XMRig exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a window
Sending a UDP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Launching a process
Creating a process with a hidden window
Enabling the 'hidden' option for files in the %temp% directory
Searching for the window
Searching for the Windows task manager window
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Connection attempt
Sending an HTTP POST request
Creating a file in the %AppData% directory
Running batch commands
Replacing files
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Replacing executable files
Reading critical registry keys
Unauthorized injection to a recently created process
Blocking the User Account Control
Stealing user critical data
Enabling a "Do not show hidden files" option
Enabling autorun by creating a file
Infecting executable files
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
coinminer evasive nanocore obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Deletes itself after installation
Detected unpacking (overwrites its own PE header)
Drops PE files with benign system names
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential dropper URLs found in powershell memory
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Schedule system process
Sigma detected: System File Execution Location Anomaly
Sigma detected: Visual Basic Command Line Compiler Usage
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 522216 Sample: Lunar Builder.exe Startdate: 15/11/2021 Architecture: WINDOWS Score: 100 95 pool.supportxmr.com 2->95 97 pool-fr.supportxmr.com 2->97 109 Antivirus / Scanner detection for submitted sample 2->109 111 Multi AV Scanner detection for dropped file 2->111 113 Multi AV Scanner detection for submitted file 2->113 115 15 other signatures 2->115 11 Lunar Builder.exe 6 2->11         started        14 svchost.exe 2->14         started        17 svchost.exe 9 1 2->17         started        20 6 other processes 2->20 signatures3 process4 dnsIp5 79 C:\Users\user\AppData\Local\...\Ljlmkkww.exe, PE32 11->79 dropped 81 C:\Users\user\AppData\Local\...\Iehbmdpf.exe, PE32 11->81 dropped 83 C:\Users\user\...\Lunar Builder.exe.log, ASCII 11->83 dropped 22 Ljlmkkww.exe 15 11->22         started        26 Iehbmdpf.exe 6 11->26         started        143 Changes security center settings (notifications, updates, antivirus, firewall) 14->143 93 127.0.0.1 unknown unknown 17->93 file6 signatures7 process8 dnsIp9 63 C:\Users\user\AppData\Local\...\Installer.exe, PE32 22->63 dropped 65 C:\Users\user\Desktop\Lunar Builder.exe.ico, MS 22->65 dropped 67 C:\Users\user\AppData\...\pknptewz.cmdline, UTF-8 22->67 dropped 73 2 other files (1 malicious) 22->73 dropped 131 Antivirus detection for dropped file 22->131 133 Multi AV Scanner detection for dropped file 22->133 135 Machine Learning detection for dropped file 22->135 137 Deletes itself after installation 22->137 29 Installer.exe 7 22->29         started        33 vbc.exe 22->33         started        103 192.168.2.1 unknown unknown 26->103 69 C:\Users\user\AppData\...behaviorgraphunaUIDotNetRT.dll, PE32 26->69 dropped 71 C:\Users\user\...\SiticoneDotNetRT.dll, PE32 26->71 dropped 139 Tries to detect virtualization through RDTSC time measurements 26->139 141 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 26->141 file10 signatures11 process12 file13 85 C:\Users\user\AppData\...\redlineTacNine.exe, PE32 29->85 dropped 87 C:\Users\user\AppData\...\JavaUpdate.exe, PE32+ 29->87 dropped 89 C:\Users\user\AppData\...\JavaSheduler.exe, PE32 29->89 dropped 145 Antivirus detection for dropped file 29->145 147 Multi AV Scanner detection for dropped file 29->147 149 Machine Learning detection for dropped file 29->149 151 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->151 35 redlineTacNine.exe 29->35         started        39 JavaSheduler.exe 29->39         started        42 JavaUpdate.exe 29->42         started        91 C:\Users\user\Desktop\Lunar Builder..exe, PE32 33->91 dropped 44 conhost.exe 33->44         started        46 cvtres.exe 33->46         started        signatures14 process15 dnsIp16 99 dontreachme.duckdns.org 136.144.41.189, 12208, 49764, 49778 WORLDSTREAMNL Netherlands 35->99 101 api.ip.sb 35->101 117 Antivirus detection for dropped file 35->117 119 Multi AV Scanner detection for dropped file 35->119 121 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 35->121 129 3 other signatures 35->129 48 conhost.exe 35->48         started        75 C:\Users\user\AppData\Roaming\...\smss.exe, PE32 39->75 dropped 123 Uses schtasks.exe or at.exe to add and modify task schedules 39->123 125 Drops PE files with benign system names 39->125 127 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 39->127 50 smss.exe 39->50         started        53 schtasks.exe 39->53         started        77 C:\Users\user\Microsoft\services.exe, PE32+ 42->77 dropped 55 cmd.exe 42->55         started        file17 signatures18 process19 signatures20 105 Multi AV Scanner detection for dropped file 50->105 57 conhost.exe 53->57         started        107 Encrypted powershell cmdline option found 55->107 59 conhost.exe 55->59         started        61 powershell.exe 55->61         started        process21
Threat name:
ByteCode-MSIL.Backdoor.NanoCore
Status:
Malicious
First seen:
2021-11-12 14:12:48 UTC
AV detection:
21 of 27 (77.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:xmrig discovery evasion infostealer miner spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
XMRig Miner Payload
RedLine
RedLine Payload
UAC bypass
xmrig
Unpacked files
SH256 hash:
0da9fd34d122db7737e8748fd3ca6b2f7a9606e52bb0168efc3c64cf2e2c4d44
MD5 hash:
80099430fb50d4c31c7ce28e2cb0fef5
SHA1 hash:
1fbaa22a5d6c76ee2d6645ec922fc449ade78581
SH256 hash:
d95d7cdb4a549a7f9a06c9059027bd90e926a15b21f118a59536ee9b5febb768
MD5 hash:
a956773892ea3bb538c4656475c35126
SHA1 hash:
e2cc84075cd18b96623fd29d529873f379e398c2
SH256 hash:
eb3897f301ae50717ef88553416800425f79d48b5a1abfdccd5d63dde3f1bca1
MD5 hash:
b6691fa95db88f556f27b087c072e8fb
SHA1 hash:
c4d70895888268e03f6e6d328a01a7d34989f261
SH256 hash:
e1c051b6bae7472dce2c4d4b8262af0de0d48e2c828d2f0eed227025088c544c
MD5 hash:
64f28899cff0fcd35036c86ba5a45421
SHA1 hash:
74378dff1da5d039f5edc9e50b3e1e0f79675130
SH256 hash:
f47186f92a5e156e7b3be0e777045a63fd39ee626d3bd56171d049106cb78ce2
MD5 hash:
90b0d77a49738f3093354b2a10ad5c8e
SHA1 hash:
23eaa5b99b203d428da8e33439f28906b6ed4006
SH256 hash:
5bfe4cedd9bddf8893ad40fdbbc14d021e8d7d259fb282bf17d49a6747085e3f
MD5 hash:
37f6ae93831aead6dbfa5540bdf29e8e
SHA1 hash:
17e5edc298ed885c238e758032f5975ae61480ba
SH256 hash:
52cad2ada36a7a4b8d5e653cfe1854d32210ef198561e4cf53ea1c4e5ebbb84f
MD5 hash:
2f92eed4e2061af0961f379e9ded70d6
SHA1 hash:
8b58dcd428759d3633a14bcfc62a8cb6deb66de5
SH256 hash:
58bf6d4db80009df3b5f9967d54575f459087100498eab59a7b13f5aa44d1e6d
MD5 hash:
541ebd27434e01ef36fb17fbb197565b
SHA1 hash:
3313d0e2bff470b4c2c6200a881ffd75054d5763
SH256 hash:
af779ba75c8d37b8e258006bbad895aa5879afc9a76e8b1d9ce3c5211a4a86ed
MD5 hash:
0ec2991fc3190d9ef8a5675839efc5f1
SHA1 hash:
109eee621d0ca5413cba5c43646237b080f90138
SH256 hash:
70bb84db2d6b53e10da46cf8dbc2ef2d02244d5a939b4e20a745090e89a0a3aa
MD5 hash:
7a9d3b9c8a842362a8df53173887e9ca
SHA1 hash:
0a27d4c0bf4c9f74cea948f8a462be64dadb7d63
SH256 hash:
81429676995a4831425ccddf6bc657942e0ef615efcbc0c6ec57b6fa078d773a
MD5 hash:
acc2d511f81496020039ab58038186f7
SHA1 hash:
4fc3fd236d2d46992ffe6d30a6390ad4e4161c35
SH256 hash:
5980bb0d8987bc37e5f9182f0bd7d78eebb47b81200cc0107171b01b8b0342d7
MD5 hash:
17d28b6b6da9da0dc9783be11094286a
SHA1 hash:
97113dc16be087e91f899f834b97794309707916
SH256 hash:
4a2c3f7e489652350d3fd9df4259c52e2a9be9eb507d011779079d1e57e0301d
MD5 hash:
2b5ae81b913c18c43d45742837f4b7f7
SHA1 hash:
9ad15498c9c077a7b9fa840b7352567b5405f1e3
Malware family:
RedLine
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 4a2c3f7e489652350d3fd9df4259c52e2a9be9eb507d011779079d1e57e0301d

(this sample)

  
Delivery method
Distributed via web download

Comments