MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a12c63a33382720b5ce010cc050106c3909316477b956ca8c17f4a1f6ca6aa42. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: a12c63a33382720b5ce010cc050106c3909316477b956ca8c17f4a1f6ca6aa42
SHA3-384 hash: cd962da665020727a7c4b6a41e4aecb1f0d9825ec44a3470e1a37d8d481d7d030fad55c80e947a405a5ffc4fe3af3adc
SHA1 hash: aa621ddde551f7e0dbeed157ab1eac3f1906f493
MD5 hash: 3240f8928a130bb155571570c563200a
humanhash: maryland-october-leopard-sixteen
File name:SecuriteInfo.com.Win64.RATX-gen.23114.17695
Download: download sample
Signature CoinMiner
File size:244'736 bytes
First seen:2023-09-22 07:34:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bc523c7da7a27a19eee259afb72c4cb9 (2 x SnakeKeylogger, 1 x CoinMiner)
ssdeep 6144:dMcz8EQnRrxT5t9kFIndDK4lY4xohYA1au77C0G:dM7XnPz9uIgGLxoSA06
Threatray 2 similar samples on MalwareBazaar
TLSH T160347D5573E50CF8E9738639C8415A45EA72BC160771EBBF03B0875A8F236916D3EB22
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter SecuriteInfoCom
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
295
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
https://ferremallasymecanizados.com/net/pass_setup1234.7z
Verdict:
Malicious activity
Analysis date:
2023-09-21 18:18:40 UTC
Tags:
privateloader evasion loader risepro stealer stealc redline povertystealer hijackloader ransomware stop smoke opendir vidar trojan arkei rat asyncrat remote raccoonclipper rhadamanthys oski teamspy g0njxa

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Connecting to a non-recommended domain
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a window
Sending a UDP request
Searching for the window
Moving a recently created file
Searching for analyzing tools
Modifying a system file
Running batch commands
Query of malicious DNS domain
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Blocking the Windows Defender launch
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Enabling autorun by creating a file
Adding an exclusion to Microsoft Defender
Adding exclusions to Windows Defender
Gathering data
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
control greyware lolbin
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Fabookie, Glupteba, SmokeLoader
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Drops script or batch files to the startup folder
Found Tor onion address
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Fabookie
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1312796 Sample: SecuriteInfo.com.Win64.RATX... Startdate: 22/09/2023 Architecture: WINDOWS Score: 100 168 Multi AV Scanner detection for domain / URL 2->168 170 Malicious sample detected (through community Yara rule) 2->170 172 Antivirus detection for URL or domain 2->172 174 10 other signatures 2->174 10 SecuriteInfo.com.Win64.RATX-gen.23114.17695.exe 1 2->10         started        13 DigitalPulseUpdate.exe 2->13         started        16 svchost.exe 2->16         started        process3 dnsIp4 184 Writes to foreign memory regions 10->184 186 Allocates memory in foreign processes 10->186 188 Injects a PE file into a foreign processes 10->188 18 AddInProcess32.exe 15 339 10->18         started        23 conhost.exe 10->23         started        162 35.182.67.195 AMAZON-02US United States 13->162 164 23.36.118.84 AKAMAI-ASUS United States 16->164 166 127.0.0.1 unknown unknown 16->166 signatures5 process6 dnsIp7 134 85.217.144.143 WS171-ASRU Bulgaria 18->134 136 107.167.110.211 OPERASOFTWAREUS United States 18->136 138 27 other IPs or domains 18->138 80 C:\Users\...\zsirzbrkb5G0NDfFWDb3aZrS.exe, PE32 18->80 dropped 82 C:\Users\...\y2pQ6vPepeare4BL20o4dnCl.exe, PE32 18->82 dropped 84 C:\Users\...\wZiyokImrkjHhoGKZ2MrsnY0.exe, PE32 18->84 dropped 86 238 other malicious files 18->86 dropped 176 Drops script or batch files to the startup folder 18->176 178 Writes many files with high entropy 18->178 25 PGKpGGyA7TTGdw23S1MBCPVm.exe 18->25         started        30 vc4VNKTQH7E8pAvkfqZo7C4H.exe 2 18->30         started        32 nJOMIJT24OwiGjo5k7pcWBkA.exe 18->32         started        34 18 other processes 18->34 file8 signatures9 process10 dnsIp11 142 107.167.110.216 OPERASOFTWAREUS United States 25->142 144 107.167.110.218 OPERASOFTWAREUS United States 25->144 150 7 other IPs or domains 25->150 106 Opera_installer_2309220736025517640.dll, PE32 25->106 dropped 120 9 other malicious files 25->120 dropped 190 Writes many files with high entropy 25->190 36 PGKpGGyA7TTGdw23S1MBCPVm.exe 25->36         started        108 C:\Users\...\vc4VNKTQH7E8pAvkfqZo7C4H.tmp, PE32 30->108 dropped 39 vc4VNKTQH7E8pAvkfqZo7C4H.tmp 30->39         started        110 C:\Users\user\AppData\Local\...\Install.exe, PE32 32->110 dropped 112 C:\Users\user\AppData\Local\...\config.txt, data 32->112 dropped 43 Install.exe 32->43         started        146 107.167.110.217 OPERASOFTWAREUS United States 34->146 148 18.65.11.107 MIT-GATEWAYSUS United States 34->148 152 13 other IPs or domains 34->152 114 C:\Users\user\Pictures\360TS_Setup.exe.P2P, PE32 34->114 dropped 116 C:\Users\user\...\360TS_Setup.exe (copy), PE32 34->116 dropped 118 C:\Users\user\AppData\Local\...\360P2SP.dll, PE32 34->118 dropped 122 9 other malicious files 34->122 dropped 192 Query firmware table information (likely to detect VMs) 34->192 194 Tries to detect sandboxes and other dynamic analysis tools (window names) 34->194 196 Found Tor onion address 34->196 198 7 other signatures 34->198 45 WlvUHsk7PwWHy3VgxoPib983.tmp 34->45         started        47 aDomMHPyOrvqolcgQ0xGmvbt.tmp 34->47         started        49 Eb5tryxBPbv5zlBRhqmIDsIS.exe 34->49         started        51 2 other processes 34->51 file12 signatures13 process14 dnsIp15 88 Opera_installer_2309220736130007840.dll, PE32 36->88 dropped 140 192.168.2.1 unknown unknown 39->140 90 C:\Users\user\AppData\...\unins000.exe (copy), PE32 39->90 dropped 92 C:\Users\user\AppData\...\is-U1VB2.tmp, PE32+ 39->92 dropped 100 5 other files (4 malicious) 39->100 dropped 180 Creates multiple autostart registry keys 39->180 182 Uses schtasks.exe or at.exe to add and modify task schedules 39->182 53 _setup64.tmp 39->53         started        55 schtasks.exe 39->55         started        57 schtasks.exe 39->57         started        59 DigitalPulseService.exe 39->59         started        94 C:\Users\user\AppData\Local\...\Install.exe, PE32 43->94 dropped 62 Install.exe 43->62         started        102 4 other files (2 malicious) 45->102 dropped 66 8758677____.exe 45->66         started        104 3 other files (2 malicious) 47->104 dropped 68 _setup64.tmp 47->68         started        96 Opera_installer_2309220736048907824.dll, PE32 49->96 dropped 98 Opera_installer_2309220736163418088.dll, PE32 51->98 dropped file16 signatures17 process18 dnsIp19 70 conhost.exe 53->70         started        72 conhost.exe 55->72         started        74 conhost.exe 57->74         started        154 3.98.219.138 AMAZON-02US United States 59->154 124 C:\Users\user\AppData\Local\...\ALolnHS.exe, PE32 62->124 dropped 126 C:\Windows\System32behaviorgraphroupPolicy\gpt.ini, ASCII 62->126 dropped 200 Modifies Group Policy settings 62->200 156 91.109.116.11 UKSERVERS-ASUKDedicatedServersHostingandCo-Location United States 66->156 158 37.230.138.66 ROCKETTELECOM-ASRU Russian Federation 66->158 160 2 other IPs or domains 66->160 128 C:\Users\user\AppData\...\Xaezholesevi.exe, PE32 66->128 dropped 130 C:\Program Files\MSBuild\...\lightcleaner.exe, PE32 66->130 dropped 132 C:\Program Files (x86)\...\Koxaeseveve.exe, PE32 66->132 dropped 202 Creates multiple autostart registry keys 66->202 76 Conhost.exe 66->76         started        78 conhost.exe 68->78         started        file20 signatures21 process22
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-09-21 18:39:18 UTC
File Type:
PE+ (Exe)
AV detection:
16 of 23 (69.57%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:fabookie family:glupteba family:privateloader family:smokeloader family:xmrig botnet:pub1 backdoor bootkit dropper evasion loader miner persistence spyware stealer themida trojan upx
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Launches sc.exe
Suspicious use of SetThreadContext
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Writes to the Master Boot Record (MBR)
.NET Reactor proctector
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
UPX packed file
Downloads MZ/PE file
Stops running service(s)
XMRig Miner payload
Detect Fabookie payload
Fabookie
Glupteba
Glupteba payload
PrivateLoader
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
xmrig
Malware Config
C2 Extraction:
http://app.nnnaajjjgc.com/check/safe
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
a12c63a33382720b5ce010cc050106c3909316477b956ca8c17f4a1f6ca6aa42
MD5 hash:
3240f8928a130bb155571570c563200a
SHA1 hash:
aa621ddde551f7e0dbeed157ab1eac3f1906f493
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe a12c63a33382720b5ce010cc050106c3909316477b956ca8c17f4a1f6ca6aa42

(this sample)

  
Delivery method
Distributed via web download

Comments