MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82346f3a4b7e84f746f6242ff70265b1467ffdcd01954f71806f86c2989a9819. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs 3 YARA File information Comments

SHA256 hash: 82346f3a4b7e84f746f6242ff70265b1467ffdcd01954f71806f86c2989a9819
SHA3-384 hash: e37f4ce1f9108959c94144525329ffc35cebfd561351baa0d4e97e2f328c630d3d99d21b309bdb2265ca1a4b074348aa
SHA1 hash: a364b7678ec9ad89a2a072995f564c12fed45af0
MD5 hash: 6755d5cc3565a018189303a4f7a237a3
humanhash: orange-nevada-oklahoma-cola
File name:82346F3A4B7E84F746F6242FF70265B1467FFDCD01954.exe
Download: download sample
Signature CoinMiner
File size:152'064 bytes
First seen:2022-02-24 05:56:01 UTC
Last seen:2022-02-24 08:03:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 80b869d1c156457b41f293ad8b5c0300 (2 x CoinMiner)
ssdeep 3072:R4rJOzXxyCsL9IlaUCJ8dYed7a/CZNAxWJ4uPgkt1ML4/wBbsu0:28zXxyCsxIla78draQAxW4uPgzBs5
TLSH T109E36D2578D1C472E66214313AB4D7F0896DFD315F60999723841BBE8E301F29AA9F3B
File icon (PE):PE icon
dhash icon 8eb2d4d0e4f4b28e (2 x RedLineStealer, 2 x CoinMiner, 1 x RaccoonStealer)
Reporter abuse_ch
Tags:CoinMiner exe


Avatar
abuse_ch
CoinMiner C2:
193.178.170.120:11930

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.178.170.120:11930 https://threatfox.abuse.ch/ioc/390299/
193.38.235.192:43770 https://threatfox.abuse.ch/ioc/390423/
23.106.122.14:443 https://threatfox.abuse.ch/ioc/390618/

Intelligence


File Origin
# of uploads :
2
# of downloads :
242
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Searching for synchronization primitives
Creating a window
Running batch commands
Launching the default Windows debugger (dwwin.exe)
Blocking the Windows Defender launch
Unauthorized injection to a recently created process
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
CallSleep
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader Socelars Tofsee onlyLogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has nameless sections
Sigma detected: Copying Sensitive Files with Credential Data
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected onlyLogger
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Tofsee
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 577855 Sample: 82346F3A4B7E84F746F6242FF70... Startdate: 24/02/2022 Architecture: WINDOWS Score: 100 85 188.114.96.7 CLOUDFLARENETUS European Union 2->85 107 Malicious sample detected (through community Yara rule) 2->107 109 Antivirus detection for URL or domain 2->109 111 Antivirus detection for dropped file 2->111 113 18 other signatures 2->113 9 82346F3A4B7E84F746F6242FF70265B1467FFDCD01954.exe 4 86 2->9         started        signatures3 process4 dnsIp5 87 80.66.64.170 VAD-SRL-AS1MD Russian Federation 9->87 89 67.222.39.89 UNIFIEDLAYER-AS-1US United States 9->89 91 18 other IPs or domains 9->91 43 C:\Users\...\nsZdQ1N883kZBHMslxDQoAOP.exe, PE32 9->43 dropped 45 C:\Users\...\kSQnx9ftECPfPiTECfiTGPZf.exe, PE32 9->45 dropped 47 C:\Users\...\jsxuMUfvjnwCIXLFGdwfC3gB.exe, PE32+ 9->47 dropped 49 38 other files (16 malicious) 9->49 dropped 117 Creates HTML files with .exe extension (expired dropper behavior) 9->117 119 Disable Windows Defender real time protection (registry) 9->119 14 CWmxlBpYpfyP0Lb2zQOMN79d.exe 17 9->14         started        18 nsZdQ1N883kZBHMslxDQoAOP.exe 9->18         started        20 1PvpdzJKrkIgOiLh6esuOqdE.exe 9->20         started        22 12 other processes 9->22 file6 signatures7 process8 dnsIp9 97 149.154.167.99 TELEGRAMRU United Kingdom 14->97 67 C:\Users\...\MAZxFSYNmBvY7lnviokMh7VO.exe, PE32 14->67 dropped 79 2 other files (1 malicious) 14->79 dropped 25 MAZxFSYNmBvY7lnviokMh7VO.exe 14->25         started        30 nsZdQ1N883kZBHMslxDQoAOP.exe 18->30         started        99 185.18.52.211 WORLDSTREAMNL Spain 20->99 69 C:\Users\user\AppData\Local\Temp\F1HD9.exe, PE32 20->69 dropped 71 C:\Users\user\AppData\Local\Temp\AMEGD.exe, PE32 20->71 dropped 81 5 other files (1 malicious) 20->81 dropped 32 conhost.exe 20->32         started        101 50.87.142.220 UNIFIEDLAYER-AS-1US United States 22->101 103 64.62.243.82 SIPARTECHFR United States 22->103 105 2 other IPs or domains 22->105 73 C:\Users\user\AppData\Local\...\xoprtkzs.exe, PE32 22->73 dropped 75 C:\Users\...\kSQnx9ftECPfPiTECfiTGPZf.tmp, PE32 22->75 dropped 77 845bbfc0-9ed1-4d13-b3c2-1f21f72b1abb.exe, PE32 22->77 dropped 83 6 other files (3 malicious) 22->83 dropped 115 Obfuscated command line found 22->115 34 kSQnx9ftECPfPiTECfiTGPZf.tmp 22->34         started        file10 signatures11 process12 dnsIp13 93 199.188.201.89 NAMECHEAP-NETUS United States 25->93 95 162.159.129.233 CLOUDFLARENETUS United States 25->95 51 C:\Users\user\...51iceProcessX64[1].bmp, PE32+ 25->51 dropped 53 C:\Users\user\AppData\...\keeperWW[1].exe, PE32 25->53 dropped 55 C:\Users\...\wXQb28hW5fft0Y8RIXfa6mou.exe, PE32 25->55 dropped 65 6 other files (none is malicious) 25->65 dropped 121 Tries to harvest and steal browser information (history, passwords, etc) 25->121 123 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 30->123 125 Maps a DLL or memory area into another process 30->125 127 Checks if the current machine is a virtual machine (disk enumeration) 30->127 129 Creates a thread in another existing process (thread injection) 30->129 57 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 34->57 dropped 59 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 34->59 dropped 61 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 34->61 dropped 63 C:\Users\user\AppData\...\5(6665____.exe, PE32 34->63 dropped 36 5(6665____.exe 34->36         started        file14 signatures15 process16 file17 39 C:\Users\user\AppData\...\Jacaedytaefa.exe, PE32 36->39 dropped 41 C:\Users\user\AppData\...\Dimavaepozhy.exe, PE32 36->41 dropped
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2022-01-08 18:44:06 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
31 of 43 (72.09%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
raccoon
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:socelars family:tofsee evasion infostealer persistence spyware stealer trojan upx
Behaviour
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
Enumerates processes with tasklist
Kills process with taskkill
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Enumerates physical storage devices
Program crash
Launches sc.exe
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
UPX packed file
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Tofsee
Malware Config
C2 Extraction:
https://sa-us-bucket.s3.us-east-2.amazonaws.com/sagdys/
193.178.170.120:11930
patmushta.info
ovicrush.cn
Unpacked files
SH256 hash:
82346f3a4b7e84f746f6242ff70265b1467ffdcd01954f71806f86c2989a9819
MD5 hash:
6755d5cc3565a018189303a4f7a237a3
SHA1 hash:
a364b7678ec9ad89a2a072995f564c12fed45af0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments