MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4de6e6c9c7bc0be888edd0b0cca866cbee745d6df2c0f34d762055cef879a0cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 13


Intelligence 13 IOCs YARA 16 File information Comments

SHA256 hash: 4de6e6c9c7bc0be888edd0b0cca866cbee745d6df2c0f34d762055cef879a0cc
SHA3-384 hash: 5bb4d3fb3958ec495e14fad5876b8ccd07cc3435e24afcb9a337b5f18c8d0c30f5993c0e2cdc4b83ec43820c24ed0ed7
SHA1 hash: 40b1ce37e962ebd8847771dbe37725edae981b7e
MD5 hash: c39cff08202cc032a0bf46f63e57aeb8
humanhash: burger-social-chicken-cardinal
File name:GoogleCrashHandler.exe
Download: download sample
Signature CoinMiner
File size:7'099'904 bytes
First seen:2023-12-10 11:21:44 UTC
Last seen:2023-12-10 13:15:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5e5ac8ab7be27ac2d1c548e5589378b6 (11 x GuLoader, 6 x Stealc, 5 x RedLineStealer)
ssdeep 196608:eJ+FhMoFDULN7VGWhfXzAf/qKWmX4OEpk:5ZDUJ7V57S/WXX
Threatray 8 similar samples on MalwareBazaar
TLSH T17D6633C11E3051F2F5FE25B0CDEE79450DC9660569BE47FBAA3408DA13E2D24B294BB2
TrID 34.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
23.4% (.EXE) Win32 Executable (generic) (4505/5/1)
10.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
10.5% (.EXE) OS/2 Executable (generic) (2029/13)
10.4% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter Xev
Tags:CoinMiner CoinMiner.XMRig exe GuLoader


Avatar
NIXLovesCooper
https://ewr1.vultrobjects.com/535e553e/GoogleCrashHandler.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
327
Origin country :
GR GR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
Searching for analyzing tools
Enabling the 'hidden' option for files in the %temp% directory
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Sending a custom TCP request
Creating a process from a recently created file
DNS request
Connecting to a cryptocurrency mining pool
Creating a service
Launching a service
Loading a system driver
Enabling autorun for a service
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Signature
Antivirus detection for dropped file
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Hides threads from debuggers
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2023-12-10 11:22:07 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
16 of 22 (72.73%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Delays execution with timeout.exe
Enumerates processes with tasklist
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Executes dropped EXE
Loads dropped DLL
XMRig Miner payload
xmrig
Unpacked files
SH256 hash:
6f6d9e5b7af83f190688d55e02d7f9507669d20145042ad123a2887aed562849
MD5 hash:
4d5938520426281a9d7875564c781733
SHA1 hash:
e7f748971f4e956bb3935490a8827ef295190722
SH256 hash:
4de6e6c9c7bc0be888edd0b0cca866cbee745d6df2c0f34d762055cef879a0cc
MD5 hash:
c39cff08202cc032a0bf46f63e57aeb8
SHA1 hash:
40b1ce37e962ebd8847771dbe37725edae981b7e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RC6_Constants
Author:chort (@chort0)
Description:Look for RC6 magic constants in binary
Reference:https://twitter.com/mikko/status/417620511397400576
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 4de6e6c9c7bc0be888edd0b0cca866cbee745d6df2c0f34d762055cef879a0cc

(this sample)

Comments