MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 59a5e46b3173bc33c36e91ea80c13771e4f760011e59d360f84070b72ebb28d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: 59a5e46b3173bc33c36e91ea80c13771e4f760011e59d360f84070b72ebb28d0
SHA3-384 hash: 216a998c36a6a2aae495646d0eb0d4ba0a953174a4f380808d9dce5cbbf9f55ddd9ce032d883b3e1f0bc84f0a6baa38f
SHA1 hash: 38bcf3a70a1b4ff4c892232c86184e2e40fbc777
MD5 hash: d04676b7a3a268480dc93075a41392ae
humanhash: sad-speaker-massachusetts-batman
File name:d04676b7a3a268480dc93075a41392ae.exe
Download: download sample
Signature CoinMiner
File size:1'259'008 bytes
First seen:2023-08-05 09:49:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:xWDb2EZwrgzzQIWJgQ84cb+w62Da/85VasfNMXA7azQLaR7MkXx:uXJ1bs4aR7M
Threatray 720 similar samples on MalwareBazaar
TLSH T1C2459207BA8F99B2C2491737C6DB148443A0D7E57723E60A794F237A08437BA9B49737
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
296
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d04676b7a3a268480dc93075a41392ae.exe
Verdict:
Malicious activity
Analysis date:
2023-08-05 09:52:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a UDP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control lolbin packed replace
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Xmrig, zgRAT
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Creates multiple autostart registry keys
Drops executable to a common third party application directory
Found hidden mapped module (file has been removed from disk)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Stop multiple services
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses ipconfig to lookup or modify the Windows network settings
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1286418 Sample: Nbd9QYVbt8.exe Startdate: 05/08/2023 Architecture: WINDOWS Score: 100 62 mylocalgamecheck.ddns.net 2->62 64 ppanel.pornsworld.xyz 2->64 80 Malicious sample detected (through community Yara rule) 2->80 82 Antivirus / Scanner detection for submitted sample 2->82 84 Multi AV Scanner detection for dropped file 2->84 88 13 other signatures 2->88 8 mobsync.exe 2->8         started        12 Nbd9QYVbt8.exe 16 6 2->12         started        15 Siolnaeylty.exe 14 3 2->15         started        17 6 other processes 2->17 signatures3 86 Performs DNS queries to domains with low reputation 62->86 process4 dnsIp5 54 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 8->54 dropped 56 C:\Users\user\AppData\...\qenbpitianut.tmp, PE32+ 8->56 dropped 98 Injects code into the Windows Explorer (explorer.exe) 8->98 100 Writes to foreign memory regions 8->100 102 Modifies the context of a thread in another process (thread injection) 8->102 116 3 other signatures 8->116 19 explorer.exe 8->19         started        78 files.catbox.moe 108.181.20.39, 443, 49684, 49685 ASN852CA Canada 12->78 58 C:\Users\user\AppData\...\Siolnaeylty.exe, PE32 12->58 dropped 104 Creates multiple autostart registry keys 12->104 106 Injects a PE file into a foreign processes 12->106 23 MSBuild.exe 15 3 12->23         started        26 cmd.exe 1 12->26         started        28 cmd.exe 1 12->28         started        108 Antivirus detection for dropped file 15->108 110 Multi AV Scanner detection for dropped file 15->110 112 Machine Learning detection for dropped file 15->112 30 cmd.exe 15->30         started        60 C:\Users\user\AppData\Roaming\...\mobsync.exe, PE32+ 17->60 dropped 114 Drops executable to a common third party application directory 17->114 32 conhost.exe 17->32         started        34 sc.exe 17->34         started        36 sc.exe 17->36         started        38 11 other processes 17->38 file6 signatures7 process8 dnsIp9 66 monerooceans.stream 199.247.0.216, 20128, 49722 AS-CHOOPAUS European Union 19->66 68 pastebin.com 19->68 70 gulf.moneroocean.stream 19->70 90 System process connects to network (likely due to code injection or exploit) 19->90 92 Query firmware table information (likely to detect VMs) 19->92 72 mylocalgamecheck.ddns.net 194.180.48.231, 49687, 49688, 49689 LVLT-10753US Germany 23->72 74 file.gta5cheathack.site 23->74 76 192.168.2.1 unknown unknown 23->76 52 C:\Users\user\AppData\Local\...\malplbfwu.exe, PE32+ 23->52 dropped 94 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 23->94 96 Uses ipconfig to lookup or modify the Windows network settings 26->96 40 conhost.exe 26->40         started        42 ipconfig.exe 1 26->42         started        44 conhost.exe 28->44         started        46 ipconfig.exe 1 28->46         started        48 conhost.exe 30->48         started        50 ipconfig.exe 30->50         started        file10 signatures11 process12
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-08-05 09:50:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Unpacked files
SH256 hash:
59a5e46b3173bc33c36e91ea80c13771e4f760011e59d360f84070b72ebb28d0
MD5 hash:
d04676b7a3a268480dc93075a41392ae
SHA1 hash:
38bcf3a70a1b4ff4c892232c86184e2e40fbc777
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments