MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 55cc17a628f34a739ffb2f1318e0762dbf61d41c17c6624615bffa667f4609a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 55cc17a628f34a739ffb2f1318e0762dbf61d41c17c6624615bffa667f4609a9
SHA3-384 hash: 7246893295e8f63382b4b8c349ae7966649226c1dccbcf3cfd02830f01b97b0c720c7f771019835ca172915641bc6be4
SHA1 hash: a9442c97cbe65287f517807de20c95f5a1499a24
MD5 hash: 6f80503f73cb1441f8e0efb0243df375
humanhash: skylark-xray-twenty-pip
File name:SecuriteInfo.com.Variant.FakeAlert.2.4549.20879
Download: download sample
Signature CoinMiner
File size:4'121'088 bytes
First seen:2021-09-29 14:14:58 UTC
Last seen:2021-11-03 10:38:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 43801be8f5954e7259ebb6bc7f6dfe40 (3 x CoinMiner, 2 x RedLineStealer, 1 x njrat)
ssdeep 49152:Nue+AOwO0oDbpZZVBYW7c6ACBFTgp4oLia2pRvr2FbB5M7X4kvzXymxiL/2stn1W:NuFpjfHbT44PoMvvemxi115lE1iT8l
Threatray 246 similar samples on MalwareBazaar
TLSH T17B163326F8DD4AD5E0B40C74022249BA49E37A1EA1509593DBFC2D4D07875EF3DA22BF
Reporter SecuriteInfoCom
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
215
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bb3ca7fb20846e85f1325aa2b3c8a51f.exe
Verdict:
Malicious activity
Analysis date:
2021-09-29 11:43:37 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Creating a file in the Windows directory
Creating a window
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
BitCoin Miner Xmrig
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Xmrig
System process connects to network (likely due to code injection or exploit)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitCoin Miner
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 493805 Sample: SecuriteInfo.com.Variant.Fa... Startdate: 30/09/2021 Architecture: WINDOWS Score: 100 136 pool-fr.supportxmr.com 91.121.140.167, 49734, 5555 OVHFR France 2->136 138 pool.supportxmr.com 2->138 148 Sigma detected: Xmrig 2->148 150 Malicious sample detected (through community Yara rule) 2->150 152 System process connects to network (likely due to code injection or exploit) 2->152 156 8 other signatures 2->156 13 SecuriteInfo.com.Variant.FakeAlert.2.4549.exe 2 2->13         started        17 BackgroundHost.exe 2->17         started        19 BiIso.exe 2->19         started        21 4 other processes 2->21 signatures3 154 Detected Stratum mining protocol 136->154 process4 dnsIp5 124 C:\Windows\altfhost.exe, PE32+ 13->124 dropped 126 C:\Windows\BackHost.exe, PE32+ 13->126 dropped 170 Adds a directory exclusion to Windows Defender 13->170 24 cmd.exe 1 13->24         started        27 cmd.exe 1 13->27         started        29 cmd.exe 1 13->29         started        128 C:\Users\user\AppData\Local\...\svchost32.exe, PE32+ 17->128 dropped 140 127.0.0.1 unknown unknown 21->140 142 192.168.2.1 unknown unknown 21->142 file6 signatures7 process8 signatures9 158 Drops executables to the windows directory (C:\Windows) and starts them 24->158 31 altfhost.exe 5 24->31         started        34 conhost.exe 24->34         started        36 BackHost.exe 5 27->36         started        38 conhost.exe 27->38         started        160 Adds a directory exclusion to Windows Defender 29->160 40 conhost.exe 29->40         started        42 powershell.exe 25 29->42         started        44 powershell.exe 29->44         started        process10 signatures11 178 Machine Learning detection for dropped file 31->178 180 Adds a directory exclusion to Windows Defender 31->180 46 cmd.exe 31->46         started        48 cmd.exe 1 31->48         started        182 Multi AV Scanner detection for dropped file 36->182 51 cmd.exe 36->51         started        53 cmd.exe 1 36->53         started        55 cmd.exe 38->55         started        process12 signatures13 57 svchost64.exe 46->57         started        61 conhost.exe 46->61         started        73 3 other processes 48->73 63 svchost32.exe 51->63         started        65 conhost.exe 51->65         started        144 Uses schtasks.exe or at.exe to add and modify task schedules 53->144 146 Adds a directory exclusion to Windows Defender 53->146 67 powershell.exe 22 53->67         started        69 conhost.exe 53->69         started        71 powershell.exe 53->71         started        75 2 other processes 55->75 process14 file15 120 C:\Windows\System32\BiIso.exe, PE32+ 57->120 dropped 162 Multi AV Scanner detection for dropped file 57->162 164 Machine Learning detection for dropped file 57->164 166 Drops executables to the windows directory (C:\Windows) and starts them 57->166 77 BiIso.exe 57->77         started        81 cmd.exe 57->81         started        83 cmd.exe 57->83         started        122 C:\Windows\System32\BackgroundHost.exe, PE32+ 63->122 dropped 85 BackgroundHost.exe 63->85         started        87 cmd.exe 63->87         started        89 cmd.exe 63->89         started        signatures16 process17 file18 130 C:\Users\user\AppData\Local\...\svchost64.exe, PE32+ 77->130 dropped 172 Multi AV Scanner detection for dropped file 77->172 174 Machine Learning detection for dropped file 77->174 176 Adds a directory exclusion to Windows Defender 77->176 91 cmd.exe 77->91         started        93 cmd.exe 77->93         started        96 conhost.exe 81->96         started        98 schtasks.exe 81->98         started        100 conhost.exe 83->100         started        102 choice.exe 83->102         started        104 conhost.exe 87->104         started        106 schtasks.exe 87->106         started        108 2 other processes 89->108 signatures19 process20 signatures21 110 svchost64.exe 91->110         started        114 conhost.exe 91->114         started        168 Adds a directory exclusion to Windows Defender 93->168 116 conhost.exe 93->116         started        118 powershell.exe 93->118         started        process22 file23 132 C:\Windows\System32\...\sihost64.exe, PE32+ 110->132 dropped 134 C:\Windows\System32\Microsoft\Libs\WR64.sys, PE32+ 110->134 dropped 184 Injects code into the Windows Explorer (explorer.exe) 110->184 186 Drops executables to the windows directory (C:\Windows) and starts them 110->186 188 Writes to foreign memory regions 110->188 190 4 other signatures 110->190 signatures24
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-09-28 19:42:50 UTC
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
55cc17a628f34a739ffb2f1318e0762dbf61d41c17c6624615bffa667f4609a9
MD5 hash:
6f80503f73cb1441f8e0efb0243df375
SHA1 hash:
a9442c97cbe65287f517807de20c95f5a1499a24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_CoinMiner02
Author:ditekSHen
Description:Detects coinmining malware
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 55cc17a628f34a739ffb2f1318e0762dbf61d41c17c6624615bffa667f4609a9

(this sample)

  
Delivery method
Distributed via web download

Comments