MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 94cbc6a1b4cc99bbfb3824eab5720009773c04a2b4e628789d7db4f824a78201. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 94cbc6a1b4cc99bbfb3824eab5720009773c04a2b4e628789d7db4f824a78201
SHA3-384 hash: 2d98bbcbf07218e264022747c9c991d06e4a4310e30bb512e2baa41df1e6bbd0b4304ff2f47bcf89089a1226fd8707ad
SHA1 hash: 2ffd83ef65c0403660268a115595c5fb3cfc8e1d
MD5 hash: 4e9369d450438e15962feb5859a43339
humanhash: illinois-seventeen-violet-paris
File name:Sapphire.exe
Download: download sample
Signature CoinMiner
File size:381'664 bytes
First seen:2021-10-15 22:04:40 UTC
Last seen:2021-10-15 23:19:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'597 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 6144:Ai/QJ27vm9TV3HVQLld3KK/F9i0gtRvK05/iZd9qN56j:Ai/QJ27vmb3VQLld3K6i0gLvK0wRqN5M
Threatray 268 similar samples on MalwareBazaar
TLSH T16F847F343AEA5019F2B3EF758FE4749BDA2FBB632B07945D209103464723A81DD9253E
Reporter Anonymous
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
435
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Sapphire.exe
Verdict:
Malicious activity
Analysis date:
2021-10-15 22:09:26 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
nanocore obfuscated overlay packed packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Defender Exclusion
Sigma detected: Xmrig
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses nslookup.exe to query domains
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 503804 Sample: Sapphire.exe Startdate: 16/10/2021 Architecture: WINDOWS Score: 100 186 Sigma detected: Xmrig 2->186 188 Found malware configuration 2->188 190 Malicious sample detected (through community Yara rule) 2->190 192 9 other signatures 2->192 14 Sapphire.exe 15 8 2->14         started        19 services32.exe 2->19         started        21 wlc32.exe 2->21         started        23 services1312.exe 2->23         started        process3 dnsIp4 152 141.94.188.139, 43059, 49734 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 14->152 154 komaiasowu.ru 81.177.141.85, 49735, 80 RTCOMM-ASRU Russian Federation 14->154 156 cdn.discordapp.com 162.159.129.233, 443, 49738 CLOUDFLARENETUS United States 14->156 142 C:\Users\user\AppData\Local\Temp\fl.exe, PE32 14->142 dropped 144 C:\Users\user\AppData\...\Sapphire.exe.log, ASCII 14->144 dropped 158 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->158 160 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 14->160 162 Tries to harvest and steal browser information (history, passwords, etc) 14->162 164 Tries to steal Crypto Currency Wallets 14->164 25 fl.exe 3 14->25         started        29 conhost.exe 14->29         started        166 Multi AV Scanner detection for dropped file 19->166 168 Writes to foreign memory regions 19->168 170 Allocates memory in foreign processes 19->170 31 conhost.exe 19->31         started        172 Creates a thread in another existing process (thread injection) 21->172 33 conhost.exe 21->33         started        35 conhost.exe 23->35         started        file5 signatures6 process7 file8 134 C:\Users\user\AppData\Local\Temp\sddo.exe, PE32+ 25->134 dropped 136 C:\Users\user\AppData\Local\Temp\sadid.exe, PE32+ 25->136 dropped 138 C:\Users\user\AppData\...\sadid-monero.exe, PE32+ 25->138 dropped 214 Antivirus detection for dropped file 25->214 216 Multi AV Scanner detection for dropped file 25->216 218 Adds a directory exclusion to Windows Defender 25->218 37 cmd.exe 1 25->37         started        39 cmd.exe 1 25->39         started        41 cmd.exe 1 25->41         started        43 cmd.exe 1 25->43         started        220 Uses nslookup.exe to query domains 29->220 140 C:\Windows\System32\Microsoft\Libs\WR64.sys, PE32+ 35->140 dropped signatures9 process10 signatures11 46 sadid-monero.exe 37->46         started        49 conhost.exe 37->49         started        51 sddo.exe 39->51         started        53 conhost.exe 39->53         started        55 sadid.exe 41->55         started        57 conhost.exe 41->57         started        222 Adds a directory exclusion to Windows Defender 43->222 59 powershell.exe 25 43->59         started        61 conhost.exe 43->61         started        63 powershell.exe 43->63         started        process12 signatures13 224 Multi AV Scanner detection for dropped file 46->224 226 Writes to foreign memory regions 46->226 228 Allocates memory in foreign processes 46->228 65 conhost.exe 3 46->65         started        230 Creates a thread in another existing process (thread injection) 51->230 68 conhost.exe 4 51->68         started        70 conhost.exe 3 55->70         started        process14 file15 124 C:\Windows\System32\services1312.exe, PE32+ 65->124 dropped 72 cmd.exe 65->72         started        75 cmd.exe 65->75         started        126 C:\Windows\System32\services32.exe, PE32+ 68->126 dropped 77 cmd.exe 68->77         started        79 cmd.exe 1 68->79         started        128 C:\Windows\System32\wlc32.exe, PE32+ 70->128 dropped 81 cmd.exe 70->81         started        83 cmd.exe 70->83         started        process16 signatures17 202 Drops executables to the windows directory (C:\Windows) and starts them 72->202 85 services1312.exe 72->85         started        88 conhost.exe 72->88         started        98 2 other processes 75->98 90 services32.exe 77->90         started        92 conhost.exe 77->92         started        204 Uses schtasks.exe or at.exe to add and modify task schedules 79->204 100 2 other processes 79->100 94 wlc32.exe 81->94         started        96 conhost.exe 81->96         started        102 2 other processes 83->102 process18 signatures19 194 Multi AV Scanner detection for dropped file 85->194 196 Writes to foreign memory regions 85->196 198 Allocates memory in foreign processes 85->198 104 conhost.exe 85->104         started        200 Creates a thread in another existing process (thread injection) 90->200 108 conhost.exe 90->108         started        110 conhost.exe 94->110         started        process20 file21 130 C:\Windows\System32\...\sihost64.exe, PE32+ 104->130 dropped 206 Drops executables to the windows directory (C:\Windows) and starts them 104->206 208 Uses nslookup.exe to query domains 104->208 210 Writes to foreign memory regions 104->210 212 3 other signatures 104->212 112 sihost64.exe 104->112         started        115 nslookup.exe 104->115         started        132 C:\Windows\System32\...\sihost32.exe, PE32+ 108->132 dropped 118 sihost32.exe 108->118         started        120 cmd.exe 110->120         started        signatures22 process23 dnsIp24 174 Multi AV Scanner detection for dropped file 112->174 176 Writes to foreign memory regions 112->176 178 Allocates memory in foreign processes 112->178 146 104.140.201.42, 49783, 5555 EONIX-COMMUNICATIONS-ASBLOCK-62904US United States 115->146 148 pool.supportxmr.com 115->148 150 pool-nyc.supportxmr.com 115->150 180 Query firmware table information (likely to detect VMs) 115->180 182 Creates a thread in another existing process (thread injection) 118->182 122 conhost.exe 118->122         started        signatures25 184 Detected Stratum mining protocol 146->184 process26
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2021-10-15 22:05:05 UTC
AV detection:
10 of 27 (37.04%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:xmrig discovery infostealer miner spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
XMRig Miner Payload
RedLine
RedLine Payload
xmrig
Malware Config
C2 Extraction:
141.94.188.139:43059
Unpacked files
SH256 hash:
2d36f42b757125056e552b54075ac24d6139f45da4aaddc80c21302a1eceeaef
MD5 hash:
a5c3263bc54c76adf75198fb2b847037
SHA1 hash:
4a7aa2e0acb8461508852c0df085016a0520a58a
SH256 hash:
94cbc6a1b4cc99bbfb3824eab5720009773c04a2b4e628789d7db4f824a78201
MD5 hash:
4e9369d450438e15962feb5859a43339
SHA1 hash:
2ffd83ef65c0403660268a115595c5fb3cfc8e1d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 94cbc6a1b4cc99bbfb3824eab5720009773c04a2b4e628789d7db4f824a78201

(this sample)

  
Delivery method
Distributed via web download

Comments