MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4e1a1db6d3dc39b67666d1e0304a7477fac814e1fbb7068560abc5eab2168c20. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
1ms0rryMiner
Vendor detections: 11
| SHA256 hash: | 4e1a1db6d3dc39b67666d1e0304a7477fac814e1fbb7068560abc5eab2168c20 |
|---|---|
| SHA3-384 hash: | df6cd65fea7a9d7bd9f9459ad21e7abf569a4c6ec8c1318d67c353e0dcd908b4a354857b6f6e9ba4c4c56391c7013a63 |
| SHA1 hash: | f0fa49ecec870e4932fd763c104571221a32ab17 |
| MD5 hash: | a37bb6cf5c9e586e7febd35a04f40885 |
| humanhash: | magazine-hamper-arizona-vermont |
| File name: | a37bb6cf5c9e586e7febd35a04f40885.exe |
| Download: | download sample |
| Signature | 1ms0rryMiner |
| File size: | 19'086'475 bytes |
| First seen: | 2021-12-09 01:10:36 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 393216:JII/JiYLRRdpwG3iCG8LWndob9l7tRnsCDkyY7L7BB5m0:JID64DEA2bP7zs7yY/7t |
| Threatray | 795 similar samples on MalwareBazaar |
| TLSH | T18A1733BE115B3600E7585130790FA316E8EF2A2736536B92A2B7E3FE577462201777B0 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | 1ms0rryMiner exe |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 194.67.111.22:80 | https://threatfox.abuse.ch/ioc/266667/ |
| http://185.163.204.229/ | https://threatfox.abuse.ch/ioc/268034/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
391
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Sending a custom TCP request
DNS request
Running batch commands
Launching a process
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contain functionality to detect virtual machines
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected AntiVM3
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fabookie
Status:
Malicious
First seen:
2021-12-05 02:33:00 UTC
File Type:
PE (Exe)
Extracted files:
179
AV detection:
22 of 27 (81.48%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 785 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:amadey family:loaderbot family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:915 botnet:e01406cf9a804c70b4a66c9ff45ad42151469416 aspackv2 backdoor infostealer loader miner stealer trojan
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
LoaderBot executable
Vidar Stealer
Amadey
LoaderBot
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://www.wgqpw.com/
https://qoto.org/@mniami
https://noc.social/@menaomi
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
185.215.113.35/d2VxjasuwS/index.php
https://qoto.org/@mniami
https://noc.social/@menaomi
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
185.215.113.35/d2VxjasuwS/index.php
Unpacked files
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
9c00e935a41bb1dc0b2b65ac18c0a1be05bdc555676e7eb8a830590b52e55436
MD5 hash:
e7526d8f9a8f888b75b85f9a1ebae3dc
SHA1 hash:
79ca1cbf3184302db8defa924c43295106021c7e
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
d1c351cb812296eb57229d7457642a58245e17f5f80bdc1731c31e245ed23558
MD5 hash:
071f0adc2721cfd1472868a572a52050
SHA1 hash:
daff31cdaf918c7685f0b4ff828211bdd7364589
Detections:
win_raccoon_auto
Parent samples :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 hash:
b56b333218590e42264e3c569891875e6e2c9955d322f2a1a940c53a09cefb63
MD5 hash:
d01a52c156a6a80dd6c12fa897159f94
SHA1 hash:
173411cd147973b6366c11bbbbf87bafcfa4403a
SH256 hash:
654cd18c377ee8b0078c79061a2f8951c24befc00b7822e9e94a297e784d75dd
MD5 hash:
e88bb230bc10e3912b99308399790ecf
SHA1 hash:
122b7472f94a649d6d27d4dc3cab8a78490cb8e7
SH256 hash:
fef7035989f56b8ab573adb9d3d91363668af7b0b71d4cb44d52f941fde3ad4f
MD5 hash:
b712d9cd25656a5f61990a394dc71c8e
SHA1 hash:
f981a7bb6085d3b893e140e85f7df96291683dd6
SH256 hash:
30757909f144945e214ab73afbf382eac64784263a8d43ae147e02cb9468c9e4
MD5 hash:
c7f6347af8222a38deb7461f82cfa75d
SHA1 hash:
eac3ebf6bc96353ab6acb3076e871068f4df6fa9
SH256 hash:
749ea9ca85c82cadd97c1094a7ec046941125a7783164092d5254967f02365be
MD5 hash:
df9fc7d1d171914899680fa18af7e1a5
SHA1 hash:
e43fe88c13957abcb86c92b1523df07077b30724
SH256 hash:
dad836d2bd54f87cbe839546179709797ecc58acbff21896c414647ccc7fe3fb
MD5 hash:
a94b505adc362bfdf4e9ef3def1cf383
SHA1 hash:
e223226c31aa036c17bf5b2d9776bdb9eda62826
SH256 hash:
451c693481de62b1a2768050df0e7aba4d7eaa2c70ef924ccc5992f947d27b70
MD5 hash:
2fa2b1760a549b8a8988fbf66c0204ab
SHA1 hash:
cf0a32127dd6d688fbebd56f6c2b672455b5683d
SH256 hash:
64f55d5e15b9dbbb0d6e16ffb9aceaee91ee440beef80e4cd1b74b0ded11c7c1
MD5 hash:
1404f942070e57b2ef0b6b3693f730be
SHA1 hash:
7ef83b925afb34c52627b66ad960400fbc1bf776
SH256 hash:
48120f6b70e627da086ed4a09f9c46dda45d961fa4402c21f7be6b0b1914fcee
MD5 hash:
e348162e876cdf048b6c064915814c0a
SHA1 hash:
7bcc942830b9b48f776cf8bceb342c2303289b45
SH256 hash:
f8db63187c22c5295eb59c00e6288479f5ce7416b61a07dd17ffce556905533e
MD5 hash:
8a9a7861748bf289ea0f22f514699351
SHA1 hash:
721ad5ec9ad96bf3b7adcdfdaee8fb0826be0892
SH256 hash:
858a5161f8e17e2f76c623d6a8ad04f12fd358ca3f608dc03da517fd84d5e475
MD5 hash:
2299f5d8a638a8ad85def72a3dc58b82
SHA1 hash:
655ff1f4f26abd1b3dde3e011e2fbf7ca9deb632
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
ddb139e299bb90fc9398381aa76c3d00e0f372d48d6c614a6d59bddb53c00368
MD5 hash:
b52833a0d5a2f8d570946f22d73e1daf
SHA1 hash:
3eb41d5b0d14fd8e28c6433d90c267cdcbdb6b13
SH256 hash:
b75f49cbc67695fd4ffe3c304efdca2d6455f24b482e8c220ccf32dacb3e2333
MD5 hash:
49bbfa92291b423e161c8f5c7cf59b0d
SHA1 hash:
2760cb34c7ff27ddfd5644926e4ad4a4f891aa5a
SH256 hash:
fb8dc0272a15b72acb0e9e4836ef4db6b888baae8ee9c40340284cbf802f3675
MD5 hash:
87a1f1791f691c79ccfee34459131f5b
SHA1 hash:
0d3e3375456dc80a57707be394e5facb3d9537bd
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
db51913dcbd74a51e46f4d8dca34ddaf44a928fd5250b34858b9d165dd68eca4
MD5 hash:
74f0d39f05f13a059791497a61471842
SHA1 hash:
f5c39e3b0429cba32f009b191d12b590378aa51e
SH256 hash:
96ded61beca893a24637e6da8b4d4f4ce5ba6420fc53edc9eeb5b35fdf3b65ef
MD5 hash:
52db6c26447e51084c4b0aef5b6d7376
SHA1 hash:
d9f16d0a7827c414aad3c51c940bf3b879333dde
SH256 hash:
59ead255ed774899f3458b6fc5756f6593c6b78e4241e648791f902aa4a6d47e
MD5 hash:
bfdd35a509849eb8239428b2643c5f75
SHA1 hash:
52c12460bfb89f837ee3066f55b4af01160ed627
SH256 hash:
a5d015dc6de8bfc6c45f6249dca708dd421ea894db658d89ce3336f90b4eb235
MD5 hash:
f1f907a4a9725c6e953caf1feaa75fea
SHA1 hash:
95ff8d5ded044f2c26ab2d7aba3466bfb3d466b2
SH256 hash:
9096abbc66b02f9fd55b4bedddfcd4364b14e4ef51e1af32088ed5dc949d69b3
MD5 hash:
775b26d6ecc0b7dd49928f2fd1f4bef4
SHA1 hash:
dd6cb8a738b1abf485d0230c2c0bfa058fdbb5a5
SH256 hash:
2d928c12bc76e263041eb98528f6d50bc2deb265d9a1480001e77304d77d2a88
MD5 hash:
1b4737c018d020bfe707544df6f5503d
SHA1 hash:
6def50bdb6db8a8c43a5465bbfd74ce47ab90778
SH256 hash:
ce9a726e7c80d81c3747eb45b8f55c25721c3d6e36ee8a76b0e129febcf0f13c
MD5 hash:
abe8a3f0472b06eb67eab821353898d5
SHA1 hash:
b87cd2b3d9b654f8c671cb5be6ba151d0409873e
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
b14fec0a69e9e2b15912beaaee8d1c44f8b34c388e2612c4cd7403484fc1bea1
MD5 hash:
2776658c902b0333ab1a674395a288d6
SHA1 hash:
b2a4be7a5a76f27817f6a7040ec81eb59dde739c
SH256 hash:
67ca3ee0dc8e9c306ce9fc3b0d636ab9084d9738da545247493854a4777f43af
MD5 hash:
84dfa1e733db02595ddfad73b326dc0f
SHA1 hash:
e7bd9f25e2f10f9ba0d9176f85aff98f14fd1ae1
SH256 hash:
4376c7b3f3f3d027c4e9b75aec847335fac07b91b03c13123cc60e182ad016e6
MD5 hash:
9c64c8e25fc5872a80dd18c87ffe1d78
SHA1 hash:
7d83bb1f7c7b35fb4834971241be7e9f2738f14f
SH256 hash:
4e1a1db6d3dc39b67666d1e0304a7477fac814e1fbb7068560abc5eab2168c20
MD5 hash:
a37bb6cf5c9e586e7febd35a04f40885
SHA1 hash:
f0fa49ecec870e4932fd763c104571221a32ab17
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.