MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 75b77800228079a5b6b94166581b2b406f6dca7baf3a9fb163aa0a2d2a89926b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments 1

SHA256 hash: 75b77800228079a5b6b94166581b2b406f6dca7baf3a9fb163aa0a2d2a89926b
SHA3-384 hash: 5a18a7d8b4a77872332b2a033d3d620e1753d0480ec33e246ae1e225bbe9209aa7bb3114e3cc64b6cb5af43f25b8aacd
SHA1 hash: 138f85fabb71e56ff351508ed79b2308883cbc41
MD5 hash: 9618279667a233d19c843a54cf2e1c81
humanhash: shade-ack-arizona-purple
File name:9618279667a233d19c843a54cf2e1c81
Download: download sample
Signature CoinMiner
File size:168'960 bytes
First seen:2021-08-05 07:45:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cea7ae85c87ddc7295d39ff9cda31d1 (85 x RedLineStealer, 67 x LummaStealer, 61 x Rhadamanthys)
ssdeep 3072:mahKyd2n31D5GWp1icKAArDZz4N9GhbkrNEkbw2rv:mahO3p0yN90QEc
Threatray 99 similar samples on MalwareBazaar
TLSH T176F36C0B67F811A6E4B5937059F203D359327D615B3882EF128EE97E1E336E0A631B17
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter zbetcheckin
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9618279667a233d19c843a54cf2e1c81
Verdict:
No threats detected
Analysis date:
2021-08-05 07:46:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a process
DNS request
Connection attempt to an infection source
Sending a UDP request
Query of malicious DNS domain
Sending a TCP request to an infection source
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 460246 Sample: WWtyaDzm1d Startdate: 05/08/2021 Architecture: WINDOWS Score: 56 20 Multi AV Scanner detection for domain / URL 2->20 22 Multi AV Scanner detection for submitted file 2->22 7 WWtyaDzm1d.exe 1 3 2->7         started        9 rundll32.exe 2->9         started        process3 process4 11 cmd.exe 1 7->11         started        process5 13 powershell.exe 14 19 11->13         started        16 conhost.exe 11->16         started        dnsIp6 18 qmumdjffuiocstjfmdqt.com 5.63.154.248, 443, 49731 AS-REGRU Russian Federation 13->18
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig evasion miner persistence
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
75b77800228079a5b6b94166581b2b406f6dca7baf3a9fb163aa0a2d2a89926b
MD5 hash:
9618279667a233d19c843a54cf2e1c81
SHA1 hash:
138f85fabb71e56ff351508ed79b2308883cbc41
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 75b77800228079a5b6b94166581b2b406f6dca7baf3a9fb163aa0a2d2a89926b

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-08-05 07:45:11 UTC

url : hxxps://qmumdjffuiocstjfmdqt.com/miner.EXE