MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 759d3e20098353e73c0c417ecf755a3ab24cdf7ead10df8c5a4aab549d7423f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments 1

SHA256 hash: 759d3e20098353e73c0c417ecf755a3ab24cdf7ead10df8c5a4aab549d7423f2
SHA3-384 hash: d7e632919a9bd49f745f2ee1059dbed4390f3c269b374f12036aa553b5cf463a881345613c1930bb1b6c556b0af0938b
SHA1 hash: 94d27127f8ffbebec6ad803599ed3c0477a15e3c
MD5 hash: 9dbcf183762872d8917b8a19535a0c65
humanhash: six-stream-pluto-sweet
File name:9dbcf183762872d8917b8a19535a0c65
Download: download sample
Signature CoinMiner
File size:2'241'536 bytes
First seen:2021-07-14 05:02:30 UTC
Last seen:2021-07-14 05:35:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 49152:7wFpwLN5DX5ecu7O4jrimxMHDUrY+BPOIz8uJxLWuXoK:8wLf8qHa1eunvXoK
TLSH T19AA53370AB448A10E316EE3E30775542D30AFA4DB7E4B1A9C1C36F882A61F47D376A57
Reporter zbetcheckin
Tags:32 CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9dbcf183762872d8917b8a19535a0c65
Verdict:
Malicious activity
Analysis date:
2021-07-14 05:05:59 UTC
Tags:
trojan miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Detected unpacking (creates a PE file in dynamic memory)
DNS related to crypt mining pools
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: WScript or CScript Dropper
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 448402 Sample: P7Oa6i5muL Startdate: 14/07/2021 Architecture: WINDOWS Score: 100 54 xmr-us-east1.nanopool.org 2->54 66 Multi AV Scanner detection for domain / URL 2->66 68 Antivirus detection for URL or domain 2->68 70 Multi AV Scanner detection for dropped file 2->70 72 8 other signatures 2->72 9 P7Oa6i5muL.exe 5 2->9         started        13 svchost.exe 2->13         started        15 svchost.exe 9 1 2->15         started        18 10 other processes 2->18 signatures3 process4 dnsIp5 48 C:\Users\user\AppData\...\P7Oa6i5muL.exe, PE32 9->48 dropped 50 C:\Users\...\P7Oa6i5muL.exe:Zone.Identifier, ASCII 9->50 dropped 52 C:\Users\user\AppData\...\P7Oa6i5muL.exe.log, ASCII 9->52 dropped 82 Writes to foreign memory regions 9->82 84 Injects a PE file into a foreign processes 9->84 20 P7Oa6i5muL.exe 6 9->20         started        86 Changes security center settings (notifications, updates, antivirus, firewall) 13->86 25 MpCmdRun.exe 1 13->25         started        62 127.0.0.1 unknown unknown 15->62 64 192.168.2.1 unknown unknown 15->64 file6 signatures7 process8 dnsIp9 56 45.144.225.135, 49719, 80 DEDIPATH-LLCUS Netherlands 20->56 42 C:\ProgramData\LKBNMTFJgl\csrss, PE32 20->42 dropped 44 C:\ProgramData\LKBNMTFJgl\r.vbs, data 20->44 dropped 74 Multi AV Scanner detection for dropped file 20->74 76 Detected unpacking (creates a PE file in dynamic memory) 20->76 78 Writes to foreign memory regions 20->78 80 4 other signatures 20->80 27 notepad.exe 20->27         started        31 cmd.exe 1 20->31         started        33 jwMZjhPggeDR.exe 20->33 injected 35 conhost.exe 25->35         started        file10 signatures11 process12 dnsIp13 58 144.217.14.139, 14444, 49721 OVHFR Canada 27->58 60 xmr-us-east1.nanopool.org 27->60 88 System process connects to network (likely due to code injection or exploit) 27->88 37 wscript.exe 1 31->37         started        40 conhost.exe 31->40         started        signatures14 90 Detected Stratum mining protocol 58->90 process15 file16 46 C:\Users\user\AppData\...\viTRMUuKeV.url, MS 37->46 dropped
Threat name:
Win32.Coinminer.BitCoinMiner
Status:
Malicious
First seen:
2021-07-14 01:06:00 UTC
AV detection:
6 of 29 (20.69%)
Threat level:
  4/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Drops startup file
UPX packed file
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
9844b1d0904c4bbe9ad17fb325a9beadf8d731dea8b92100419aee92cedc6fdd
MD5 hash:
4db6eac9f1cd0fb3bfce3dafdccb9e00
SHA1 hash:
b646e7824bea0e253ee957311296e605dfa5af28
SH256 hash:
30d993b24a703a69422ff6aa90e6fc161b170dd16bab1ae3a7344b1b9e857da1
MD5 hash:
c4998b01005365aa4ff24d9367e3ec4a
SHA1 hash:
ebc3f2e32a6122cb394f02266e13d02f13ffec65
SH256 hash:
b4a1bcb5f03de27c13864664b0c0fefd15cd858c9e5a1f8d0fe7c0e872876cc6
MD5 hash:
0088972fbfd99c959a6af98cb3e74cc0
SHA1 hash:
d22546f335582e6e1bdcaa41d76f49d0769b5c67
SH256 hash:
0a1c00bde9aa05fecb0892a66a27c19232d41944b0bcaced3d92a5e1ec980525
MD5 hash:
000cce9ff3115bf704721a394bd93c3c
SHA1 hash:
b0f0834b066b3be907fce8d43320e2a0fdbfa158
SH256 hash:
759d3e20098353e73c0c417ecf755a3ab24cdf7ead10df8c5a4aab549d7423f2
MD5 hash:
9dbcf183762872d8917b8a19535a0c65
SHA1 hash:
94d27127f8ffbebec6ad803599ed3c0477a15e3c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 759d3e20098353e73c0c417ecf755a3ab24cdf7ead10df8c5a4aab549d7423f2

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-14 05:02:31 UTC

url : hxxp://45.144.225.135/notepad.exe