MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b0d6717a7d98595e7727f5309e19a1f3dae7986d1809f14f8de4edfb2810a3e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: 8b0d6717a7d98595e7727f5309e19a1f3dae7986d1809f14f8de4edfb2810a3e
SHA3-384 hash: 3814e12ebef301c3a89c32eb42a849e62550e2ccf7494e77d514d67e14c445c76f3d40751e902c5b49efb04d6cf5ab15
SHA1 hash: 24bf0064905ec74e7af910d67336fe8abbd03180
MD5 hash: 3850da593a53aa0c119c5cbc58e43b34
humanhash: neptune-steak-queen-pizza
File name:test.exe
Download: download sample
Signature CoinMiner
File size:3'016'704 bytes
First seen:2020-12-13 03:57:56 UTC
Last seen:2020-12-13 05:31:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 49152:wjlnE3YhmEBtA7kkV704UMIGp7vQIKW5iAdJzP8InZcGX3S3fuOZE:wj1NhvAw404UMHp7vUW5iAbj8g7yPuO
TLSH F0D5232238826848D9684DBE0538B2D572B4AAC8BA55CFBFB0DE230CDF5108F77555B7
Reporter vm001cn
Tags:CoinMiner exe miner

Intelligence


File Origin
# of uploads :
2
# of downloads :
873
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
test.exe
Verdict:
Malicious activity
Analysis date:
2020-12-13 01:50:53 UTC
Tags:
miner trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Launching cmd.exe command interpreter
Creating a file
Creating a process from a recently created file
Launching a process
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Enabling autorun
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Allocates memory in foreign processes
Creates an undocumented autostart registry key
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 329709 Sample: test.exe Startdate: 13/12/2020 Architecture: WINDOWS Score: 80 67 pool.supportxmr.com 2->67 69 pool-fr.supportxmr.com 2->69 75 Multi AV Scanner detection for submitted file 2->75 10 test.exe 5 2->10         started        14 svchost.exe 3 4 2->14         started        16 svchost.exe 1 2->16         started        18 svchost.exe 2->18         started        signatures3 process4 file5 65 C:\Users\user\AppData\Local\...\test.exe.log, ASCII 10->65 dropped 77 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->77 20 cmd.exe 1 10->20         started        22 cmd.exe 2 10->22         started        25 WerFault.exe 14->25         started        signatures6 process7 file8 27 asdas.exe 3 20->27         started        30 conhost.exe 20->30         started        63 C:\Users\user\AppData\Roaming\...\asdas.exe, PE32 22->63 dropped 32 conhost.exe 22->32         started        process9 signatures10 79 Multi AV Scanner detection for dropped file 27->79 81 Uses cmd line tools excessively to alter registry or file data 27->81 83 Writes to foreign memory regions 27->83 85 3 other signatures 27->85 34 cmd.exe 1 27->34         started        37 cmd.exe 1 27->37         started        39 cmd.exe 1 27->39         started        41 6 other processes 27->41 process11 signatures12 73 Uses cmd line tools excessively to alter registry or file data 34->73 43 reg.exe 1 1 34->43         started        46 conhost.exe 34->46         started        48 conhost.exe 37->48         started        50 reg.exe 1 37->50         started        52 conhost.exe 39->52         started        54 reg.exe 1 39->54         started        56 WerFault.exe 23 9 41->56         started        59 conhost.exe 41->59         started        61 8 other processes 41->61 process13 dnsIp14 87 Creates an undocumented autostart registry key 43->87 71 192.168.2.1 unknown unknown 56->71 signatures15
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-12-13 03:58:07 UTC
AV detection:
8 of 48 (16.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetThreadContext
Loads dropped DLL
Drops startup file
Executes dropped EXE
UPX packed file
XMRig Miner Payload
ServiceHost packer
Modifies WinLogon for persistence
xmrig
Unpacked files
SH256 hash:
4f690f3cf792f24a571f09740cf25d0979bde8c11180a26864056643c30479cd
MD5 hash:
304cc4a1948539064cfec5b70bd83e21
SHA1 hash:
32b3754f52323fd71b8349f01c9dd4bc4fecd880
SH256 hash:
4a4742b8365f8f2e87878a2c6237649dd0a589ac5e1da4330c79fccd35302012
MD5 hash:
058d59c848bf5d3bb9502b067dfdfcf3
SHA1 hash:
a9bf22e4da63ea5f7843167a08b7ba8e5143c067
SH256 hash:
f9c341679423a3ac010b7da292ab6d1ef0ae7e995cd085ada95e1384ba3af38c
MD5 hash:
b1c72a8e99542c64507470535686ddd9
SHA1 hash:
fe3bec4b6e2b7091db68705feb59090c24c8b6ed
SH256 hash:
9790a6aa3d28d77d320c8f32938122c1212b7f6291daa7511f854a3fcd0fb037
MD5 hash:
6e53bc3c0364eefd1d448d25e026975d
SHA1 hash:
f11ea87b0638531f442b113feb19dbaae81ad518
SH256 hash:
9844b1d0904c4bbe9ad17fb325a9beadf8d731dea8b92100419aee92cedc6fdd
MD5 hash:
4db6eac9f1cd0fb3bfce3dafdccb9e00
SHA1 hash:
b646e7824bea0e253ee957311296e605dfa5af28
SH256 hash:
8b0d6717a7d98595e7727f5309e19a1f3dae7986d1809f14f8de4edfb2810a3e
MD5 hash:
3850da593a53aa0c119c5cbc58e43b34
SHA1 hash:
24bf0064905ec74e7af910d67336fe8abbd03180
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:XMRIG_Miner

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments