MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8ae8b54bc449ebeb94ba2ad9e0fe136404dec237f612459282ef465e5df59160. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 6


Intelligence 6 IOCs YARA 5 File information Comments

SHA256 hash: 8ae8b54bc449ebeb94ba2ad9e0fe136404dec237f612459282ef465e5df59160
SHA3-384 hash: ed89b7c8c0b24ffbfe248ac57324b8d74a47a2ef7366562a4e9d99d2159105a39f8fbb9d096b2f3e959e1cc277339841
SHA1 hash: e1e51d530a28ed24008e48b7c6c3979a5ff5f6d5
MD5 hash: fdd3d1bb330fbd72c95ac49bc0263b3b
humanhash: bakerloo-purple-burger-connecticut
File name:PPSSPP.bin
Download: download sample
Signature CoinMiner
File size:6'148'180 bytes
First seen:2020-10-10 23:16:19 UTC
Last seen:2020-10-10 23:47:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d221b1dc8c3a08622f6512e7876527c8 (3 x ZhongStealer, 2 x ValleyRAT, 1 x CoinMiner)
ssdeep 98304:KQHmkBvc8Xoy6gio1AW952kYKi1kM/a34Aowxo9fjq/+VaRlrbFy9m2NNAM+h2Mq:KWmkCm6ILGL8M/7A9xaq/CUFyAagFoD
Threatray 9 similar samples on MalwareBazaar
TLSH 855633097AD22293EB458A323BD004554FE2EAFEBC0D3436FBD54A585D89933D461AF3
Reporter vm001cn
Tags:AutoIT CoinMiner

Intelligence


File Origin
# of uploads :
2
# of downloads :
330
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Sending a UDP request
Creating a window
Using the Windows Management Instrumentation requests
Running batch commands
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Launching a process
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Moving a file to the %AppData% subdirectory
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Delayed writing of the file
Setting a single autorun event
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 296224 Sample: PPSSPP.bin Startdate: 11/10/2020 Architecture: WINDOWS Score: 68 65 Antivirus / Scanner detection for submitted sample 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 Uses ping.exe to sleep 2->69 71 2 other signatures 2->71 8 PPSSPP.exe 11 2->8         started        process3 file4 51 C:\Users\user\AppData\...\interpretex86.exe, PE32 8->51 dropped 53 C:\Users\user\AppData\Local\...\genteert.dll, PE32 8->53 dropped 55 C:\Users\user\AppData\...\interpretex64.exe, PE32+ 8->55 dropped 57 C:\Users\user\AppData\Local\Temp\...\guig.dll, PE32 8->57 dropped 11 cmd.exe 1 8->11         started        14 interpretex64.exe 8->14         started        process5 dnsIp6 73 Uses ping.exe to sleep 11->73 17 PING.EXE 1 11->17         started        20 conhost.exe 11->20         started        22 PING.EXE 1 11->22         started        63 192.168.2.1 unknown unknown 14->63 24 cmd.exe 1 14->24         started        26 cmd.exe 2 14->26         started        29 cmd.exe 1 14->29         started        31 2 other processes 14->31 signatures7 process8 dnsIp9 61 127.0.0.1 unknown unknown 17->61 33 cdg.exe 24->33         started        35 conhost.exe 24->35         started        37 timeout.exe 1 24->37         started        59 C:\Users\user\AppData\Roaming\...\cdg.exe, PE32+ 26->59 dropped 39 conhost.exe 26->39         started        41 conhost.exe 29->41         started        43 timeout.exe 1 29->43         started        45 conhost.exe 31->45         started        47 conhost.exe 31->47         started        49 timeout.exe 1 31->49         started        file10 process11
Threat name:
Win32.Trojan.CoinMiner
Status:
Malicious
First seen:
2020-10-10 01:12:36 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx discovery persistence
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Runs ping.exe
Suspicious use of SetThreadContext
Adds Run key to start application
JavaScript code in executable
Loads dropped DLL
Modifies file permissions
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
8ae8b54bc449ebeb94ba2ad9e0fe136404dec237f612459282ef465e5df59160
MD5 hash:
fdd3d1bb330fbd72c95ac49bc0263b3b
SHA1 hash:
e1e51d530a28ed24008e48b7c6c3979a5ff5f6d5
SH256 hash:
170dddf0bd521c506739b92a437f993914302ca861b8456e9994c8f9fc93ba23
MD5 hash:
abff11f42f0140959f2fd079a89b3efb
SHA1 hash:
8123e7089ba06aad1134a1373df2e37fe3d36392
SH256 hash:
85bdda571042543aea5c823a30d23304b9257169dc4fb2ecea04de73b136012d
MD5 hash:
6a3a5300c71d3911a67f9b5f1b9a7ad0
SHA1 hash:
2f8e2a9331c0070a44696b7285589fd0520395ad
SH256 hash:
19e1887260c606247926610d0d038572f3ef49e4f5013b00696fc2ee7c07aee1
MD5 hash:
dbc447e1225356e6814c4e4d5ebfafef
SHA1 hash:
0580c1c0b32a6021366b5510012c9c6e54173c71
SH256 hash:
722c7f6e669188f7f1ada29625c12dcc65baf8caeafabe22963169fa34be0aa5
MD5 hash:
cda893288b690a0280e0e4e37f06390f
SHA1 hash:
699c97eb697998f26199bc4552c2f21a0697172f
SH256 hash:
005c251c21d6a5ba1c3281e7b9f3b4f684d007e0c3486b34a545bb370d8420aa
MD5 hash:
d3f8c0334c19198a109e44d074dac5fd
SHA1 hash:
167716989a62b25e9fcf8e20d78e390a52e12077
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cryptocoin_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:XMRIG_Miner

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments