MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA3-384 hash: 8332e2aa76722e7106259025917f597f04b4ec178dcac23083e28058675efd3eae79733d6556cc82cdd4effea3803560
SHA1 hash: 0b688305eb02ab06c8937de018f698fa3ddbad57
MD5 hash: 1c9bb6efaebb7a43cab38e3d58b5134c
humanhash: virginia-florida-apart-vegan
File name:SecuriteInfo.com.Trojan.Siggen12.47248.1366.23331
Download: download sample
Signature CoinMiner
File size:72'704 bytes
First seen:2021-03-22 06:46:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 768:YdTddyzeY8phVbizLDQ9ANxKeE3R4ekDlEJJJJJJJJJJJJJJJJJcgll3YELFBk68:llJE46EsseeQXJH4CfK/CUcgQIb
Threatray 515 similar samples on MalwareBazaar
TLSH 3463284132A8DA17C57853F5C47250F057BA6E01E571EACF2CDA7CCA7AF6B120B82A47
Reporter SecuriteInfoCom
Tags:CoinMiner

Intelligence


File Origin
# of uploads :
1
# of downloads :
384
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.Siggen12.47248.1366.23331
Verdict:
Malicious activity
Analysis date:
2021-03-22 06:47:57 UTC
Tags:
evasion loader trojan stealer vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Sending an HTTP GET request
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a file
Creating a process from a recently created file
Connecting to a non-recommended domain
Sending a UDP request
Deleting a recently created file
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Searching for the window
Delayed reading of the file
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Launching a tool to kill processes
Stealing user critical data
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 372634 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 22/03/2021 Architecture: WINDOWS Score: 100 133 Found malware configuration 2->133 135 Malicious sample detected (through community Yara rule) 2->135 137 Antivirus detection for URL or domain 2->137 139 5 other signatures 2->139 12 SecuriteInfo.com.Trojan.Siggen12.47248.1366.exe 17 6 2->12         started        17 MicrosoftEkHkqDKzoEKLElr_fXO1UNazUpdater.exe 16 6 2->17         started        19 MicrosofttlPqeNMPwhLKo18_Px3TVMklUpdater.exe 2->19         started        21 2 other processes 2->21 process3 dnsIp4 125 108.167.143.77 UNIFIEDLAYER-AS-1US United States 12->125 127 92.63.99.163 THEFIRST-ASRU Russian Federation 12->127 131 13 other IPs or domains 12->131 99 C:\Users\...\q9lbZtf98JA61UjKkrPaYEM9.exe, PE32 12->99 dropped 101 MicrosoftEkHkqDKzo...fXO1UNazUpdater.exe, PE32 12->101 dropped 103 MicrosoftEkHkqDKzo...exe:Zone.Identifier, ASCII 12->103 dropped 161 Drops PE files to the document folder of the user 12->161 163 Creates multiple autostart registry keys 12->163 23 q9lbZtf98JA61UjKkrPaYEM9.exe 24 12->23         started        129 104.23.99.190 CLOUDFLARENETUS United States 17->129 105 C:\Users\...\5RtYNKNEl3igW76PawY4v1EQ.exe, PE32 17->105 dropped 107 MicrosofttlPqeNMPw...Px3TVMklUpdater.exe, PE32 17->107 dropped 109 MicrosofttlPqeNMPw...exe:Zone.Identifier, ASCII 17->109 dropped 28 5RtYNKNEl3igW76PawY4v1EQ.exe 17->28         started        111 C:\Users\...\wQfaUPWYq6iBgtfI3dKyohhW.exe, PE32 19->111 dropped 113 Microsoft9qLw3KimS...eCbmi_EXUpdater.exe, PE32 19->113 dropped 115 C:\Users\user\AppData\Local\...\null[1], PE32 21->115 dropped file5 signatures6 process7 dnsIp8 121 91.200.41.57 HVOSTING-ASUA Ukraine 23->121 123 34.89.220.179 GOOGLEUS United States 23->123 85 C:\Users\user\AppData\...\07594445573.exe, PE32 23->85 dropped 87 C:\Users\user\AppData\...\00198598484.exe, PE32 23->87 dropped 89 C:\Users\user\AppData\Local\...\file[1].exe, PE32 23->89 dropped 155 Detected unpacking (changes PE section rights) 23->155 157 Detected unpacking (overwrites its own PE header) 23->157 30 cmd.exe 1 23->30         started        32 cmd.exe 23->32         started        34 cmd.exe 23->34         started        91 C:\Users\user\AppData\...\43305237816.exe, PE32 28->91 dropped 93 C:\Users\user\AppData\...\98650990441.exe, PE32 28->93 dropped 95 C:\Users\user\AppData\Local\...\file[1].exe, PE32 28->95 dropped 97 2 other files (none is malicious) 28->97 dropped 36 cmd.exe 28->36         started        38 cmd.exe 28->38         started        file9 signatures10 process11 process12 40 00198598484.exe 30->40         started        43 conhost.exe 30->43         started        45 07594445573.exe 32->45         started        47 conhost.exe 32->47         started        49 conhost.exe 34->49         started        51 taskkill.exe 34->51         started        53 43305237816.exe 36->53         started        55 conhost.exe 36->55         started        57 conhost.exe 38->57         started        signatures13 145 Detected unpacking (changes PE section rights) 40->145 147 Detected unpacking (overwrites its own PE header) 40->147 149 Contains functionality to inject code into remote processes 40->149 59 00198598484.exe 40->59         started        151 Tries to harvest and steal browser information (history, passwords, etc) 45->151 153 Injects a PE file into a foreign processes 53->153 62 43305237816.exe 53->62         started        process14 signatures15 159 Injects a PE file into a foreign processes 59->159 64 00198598484.exe 59->64         started        69 43305237816.exe 62->69         started        process16 dnsIp17 117 195.201.225.248 HETZNER-ASDE Germany 64->117 119 34.91.189.70 GOOGLEUS United States 64->119 77 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 64->77 dropped 79 C:\Users\user\AppData\...\vcruntime140.dll, PE32 64->79 dropped 81 C:\Users\user\AppData\...\ucrtbase.dll, PE32 64->81 dropped 83 56 other files (none is malicious) 64->83 dropped 141 Tries to steal Mail credentials (via file access) 64->141 143 Tries to harvest and steal browser information (history, passwords, etc) 64->143 71 cmd.exe 64->71         started        file18 signatures19 process20 process21 73 conhost.exe 71->73         started        75 timeout.exe 71->75         started       
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2021-03-20 16:27:49 UTC
AV detection:
17 of 47 (36.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:vidar botnet:afefd33a49c7cbd55d417545269920f24c85aa37 botnet:c46f13f8aadc028907d65c627fd9163161661f6c backdoor discovery evasion infostealer persistence spyware stealer trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Maps connected drives based on registry
Drops startup file
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
Sets service image path in registry
UPX packed file
VMProtect packed file
Checks for common network interception software
Raccoon
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Unpacked files
SH256 hash:
596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
MD5 hash:
1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 hash:
0b688305eb02ab06c8937de018f698fa3ddbad57
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cryptocoin_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:XMRIG_Miner

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f

(this sample)

  
Delivery method
Distributed via web download

Comments