MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c
SHA3-384 hash: 20c2a3de5014533f1b3f0d8258d41c4c9f2f5aa87df186694b212b052b28c92bcb93ddef0bd65c56f8a393a5a9b8b4fb
SHA1 hash: fa99887f95f5e0fe48e37c2d464eb56ef1619031
MD5 hash: 136860e019115c0eefd8cf669dd8963e
humanhash: fifteen-robin-butter-july
File name:136860e019115c0eefd8cf669dd8963e
Download: download sample
Signature CoinMiner
File size:357'376 bytes
First seen:2022-01-10 08:27:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2c5f2513605e48f2d8ea5440a870cb9e (60 x Babadeda, 6 x AveMariaRAT, 5 x CoinMiner)
ssdeep 6144:b5aWbksiNTBtZrhUJctzVtAWL9wCt7ZWfTUYcDy7D9ghpsodi2V/llT2R:b5atNTXZlUMAWLRt0YYo+uC0bFT2R
Threatray 78 similar samples on MalwareBazaar
TLSH T19C741251F6E582F3E6E1047201A2B16E9B36A3349720E5D7C78C3D41AB53AE293793DC
Reporter zbetcheckin
Tags:32 CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
220
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
136860e019115c0eefd8cf669dd8963e
Verdict:
Malicious activity
Analysis date:
2022-01-10 08:29:55 UTC
Tags:
evasion trojan rat redline loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process from a recently created file
Creating a window
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Launching a process
Searching for the window
Searching for analyzing tools
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Forced system process termination
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitCoin Miner RedLine Xmrig
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Command shell drops VBS files
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Potential malicious VBS script found (suspicious strings)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Windows Crypto Mining Indicators
Sigma detected: WScript or CScript Dropper
Sigma detected: Xmrig
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses BatToExe to download additional code
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected BatToExe compiled binary
Yara detected BitCoin Miner
Yara detected RedLine Stealer
Yara detected Telegram Recon
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 549998 Sample: TwUQy6g4z3 Startdate: 10/01/2022 Architecture: WINDOWS Score: 100 165 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->165 167 Sigma detected: Xmrig 2->167 169 Antivirus detection for URL or domain 2->169 171 16 other signatures 2->171 11 TwUQy6g4z3.exe 10 2->11         started        15 dllhost.exe 2->15         started        17 setup3.exe 2->17         started        19 6 other processes 2->19 process3 file4 97 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32 11->97 dropped 99 C:\Users\user\AppData\Local\Temp\...\CA82.bat, ASCII 11->99 dropped 191 Potential malicious VBS script found (suspicious strings) 11->191 21 cmd.exe 3 6 11->21         started        25 conhost.exe 11->25         started        193 Antivirus detection for dropped file 15->193 195 Multi AV Scanner detection for dropped file 15->195 197 Detected unpacking (changes PE section rights) 15->197 199 Machine Learning detection for dropped file 15->199 201 Tries to detect sandboxes and other dynamic analysis tools (window names) 17->201 203 Tries to evade analysis by execution special instruction which cause usermode exception 17->203 205 Hides threads from debuggers 17->205 27 Driver.exe 17->27         started        29 Driver.exe 17->29         started        signatures5 process6 dnsIp7 95 C:\Users\user\AppData\Local\Temp\...\123.vbs, ASCII 21->95 dropped 181 Potential malicious VBS script found (suspicious strings) 21->181 183 Command shell drops VBS files 21->183 185 Uses BatToExe to download additional code 21->185 32 setup1.exe 21->32         started        35 setup2.exe 4 21->35         started        39 setup3.exe 21->39         started        47 6 other processes 21->47 187 Detected unpacking (changes PE section rights) 27->187 41 conhost.exe 27->41         started        43 WerFault.exe 27->43         started        125 pool-nyc.supportxmr.com 104.140.244.186, 3333, 49781 EONIX-COMMUNICATIONS-ASBLOCK-62904US United States 29->125 127 pool.supportxmr.com 29->127 45 conhost.exe 29->45         started        file8 189 Detected Stratum mining protocol 125->189 signatures9 process10 dnsIp11 129 Multi AV Scanner detection for dropped file 32->129 131 Writes to foreign memory regions 32->131 133 Allocates memory in foreign processes 32->133 151 2 other signatures 32->151 49 AppLaunch.exe 14 7 32->49         started        111 yandex.ru 77.88.55.77, 443, 49775 YANDEXRU Russian Federation 35->111 81 C:\Users\user\AppData\Roaming\...\dllhost.exe, MS-DOS 35->81 dropped 135 Antivirus detection for dropped file 35->135 137 Detected unpacking (changes PE section rights) 35->137 139 Machine Learning detection for dropped file 35->139 83 C:\Users\user\AppData\...\setup3.exe (copy), MS-DOS 39->83 dropped 85 C:\Users\user\AppData\Roaming\...\Driver.exe, MS-DOS 39->85 dropped 87 C:\Users\user\AppData\Roaming\...\Driver.url, MS 39->87 dropped 141 Creates multiple autostart registry keys 39->141 143 Tries to evade analysis by execution special instruction which cause usermode exception 39->143 145 Hides threads from debuggers 39->145 113 a0617224.xsph.ru 141.8.192.58, 49772, 49773, 49774 SPRINTHOSTRU Russian Federation 47->113 115 iplogger.org 148.251.234.83, 443, 49771 HETZNER-ASDE Germany 47->115 117 192.168.2.1 unknown unknown 47->117 89 C:\Users\user\AppData\Local\...\setup1.exe, PE32 47->89 dropped 91 C:\Users\user\AppData\Local\...\setup3.exe, MS-DOS 47->91 dropped 93 C:\Users\user\AppData\Local\...\setup2.exe, MS-DOS 47->93 dropped 147 System process connects to network (likely due to code injection or exploit) 47->147 149 May check the online IP address of the machine 47->149 54 WerFault.exe 47->54         started        56 WerFault.exe 47->56         started        file12 signatures13 process14 dnsIp15 105 45.9.20.101, 23970, 49777 DEDIPATH-LLCUS Russian Federation 49->105 107 bitbucket.org 104.192.141.1, 443, 49782, 49784 AMAZON-02US United States 49->107 109 4 other IPs or domains 49->109 77 C:\Users\user\AppData\Local\Temp\mine.exe, PE32 49->77 dropped 79 C:\Users\user\AppData\Local\Temp\luxe.exe, PE32 49->79 dropped 173 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 49->173 175 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 49->175 177 Tries to harvest and steal browser information (history, passwords, etc) 49->177 179 Tries to steal Crypto Currency Wallets 49->179 58 mine.exe 49->58         started        63 luxe.exe 49->63         started        file16 signatures17 process18 dnsIp19 123 data-host-coin-8.com 31.28.27.176, 49786, 49787, 80 HOSTING-MSKRU Russian Federation 58->123 101 C:\ProgramData\488_1641734566_606.exe, PE32 58->101 dropped 103 C:\ProgramData\1097_1641734495_6518.exe, PE32+ 58->103 dropped 207 Multi AV Scanner detection for dropped file 58->207 209 Machine Learning detection for dropped file 58->209 65 1097_1641734495_6518.exe 58->65         started        68 488_1641734566_606.exe 58->68         started        71 WerFault.exe 58->71         started        211 Antivirus detection for dropped file 63->211 file20 signatures21 process22 dnsIp23 153 Antivirus detection for dropped file 65->153 155 Multi AV Scanner detection for dropped file 65->155 157 Detected unpacking (changes PE section rights) 65->157 163 6 other signatures 65->163 73 conhost.exe 65->73         started        119 ip-api.com 208.95.112.1, 49788, 80 TUT-ASUS United States 68->119 121 api.telegram.org 149.154.167.220, 443, 49789 TELEGRAMRU United Kingdom 68->121 159 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 68->159 161 May check the online IP address of the machine 68->161 75 conhost.exe 68->75         started        signatures24 process25
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2022-01-10 05:44:52 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
20 of 43 (46.51%)
Threat level:
  5/5
Result
Malware family:
mimikatz
Score:
  10/10
Tags:
family:loaderbot family:mimikatz loader miner persistence upx
Behaviour
Modifies registry class
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Drops startup file
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
LoaderBot executable
mimikatz is an open source tool to dump credentials on Windows
LoaderBot
Mimikatz
Unpacked files
SH256 hash:
8d0e69c941abff41fa00b0d4f29f276dc2f984560a99de35c4da0e34b0e36100
MD5 hash:
666ad6ab21e49abf2d380ef2c9815d1c
SHA1 hash:
aeb236ad3b2e457b8817a6b78ab4732ecca577ab
SH256 hash:
4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c
MD5 hash:
136860e019115c0eefd8cf669dd8963e
SHA1 hash:
fa99887f95f5e0fe48e37c2d464eb56ef1619031
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-10 08:27:26 UTC

url : hxxp://a0617224.xsph.ru/444.exe