MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3c743f00e4cf6e8a71132c43ecda56aa86a773df375c62bc7b347bdd05ea4c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: a3c743f00e4cf6e8a71132c43ecda56aa86a773df375c62bc7b347bdd05ea4c4
SHA3-384 hash: b9c4ca5ed144a92bb5598edb86147e0261dcd61c23328b9199f17184760e323d77f4f4d804cf7fcc4c07a951e276e499
SHA1 hash: c96e17fac8abf010d0c97d29d1caf947f9d4236f
MD5 hash: 2359ae761e83185f3e669965845b25d2
humanhash: minnesota-london-twenty-hydrogen
File name:$Bthudtask 01.exe
Download: download sample
Signature CoinMiner
File size:3'945'984 bytes
First seen:2022-01-25 16:11:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 332f7ce65ead0adfb3d35147033aabe9 (83 x XRed, 18 x SnakeKeylogger, 7 x DarkComet)
ssdeep 98304:Gnsmtk2aNGJitgshNYY/eaD6RNsDOSknF3SDStk0g:4LSGJgg6NTGaDwN2fkFqS60g
Threatray 40 similar samples on MalwareBazaar
TLSH T1AD061233F6D18537D1331A3D9C5BA3A4582ABF512E38794A3BE91E4D5E3E68138242D3
dhash icon e2e6a6a28ab6b2aa (1 x CoinMiner)
Reporter r3dbU7z
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
$Bthudtask 01.exe
Verdict:
Malicious activity
Analysis date:
2022-01-25 16:16:04 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Moving a recently created file
Searching for analyzing tools
Searching for the window
Creating a file in the %temp% directory
Moving a file to the %temp% directory
Modifying an executable file
DNS request
Sending an HTTP GET request
Sending a UDP request
Creating a file in the Windows subdirectories
Creating a service
Launching a service
Running batch commands
Creating a process with a hidden window
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Enabling autorun for a service
Infecting executable files
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
autorun cmd.exe coinminer control.exe darkkomet emotet evasive greyware hacktool keylogger macros macros-on-close macros-on-open packed remote.exe shell32.dll virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Mimikatz
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to detect sleep reduction / modifications
Detected unpacking (changes PE section rights)
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with functions possibly related to WSH operations (process, registry, environment, or keystrokes)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Mimikatz
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 560083 Sample: $Bthudtask 01.exe Startdate: 26/01/2022 Architecture: WINDOWS Score: 100 49 127.0.0.1 unknown unknown 2->49 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus detection for dropped file 2->65 67 Antivirus / Scanner detection for submitted sample 2->67 69 13 other signatures 2->69 9 $Bthudtask 01.exe 1 6 2->9         started        12 SkWcsk.exe 2->12         started        15 svchost.exe 1 2->15         started        17 3 other processes 2->17 signatures3 process4 file5 39 C:\Users\user\...\._cache_$Bthudtask 01.exe, PE32 9->39 dropped 41 C:\ProgramData\Synaptics\Synaptics.exe, PE32 9->41 dropped 43 C:\ProgramData\Synaptics\RCX43E8.tmp, PE32 9->43 dropped 45 C:\...\Synaptics.exe:Zone.Identifier, ASCII 9->45 dropped 19 ._cache_$Bthudtask 01.exe 2 9->19         started        23 Synaptics.exe 397 9->23         started        81 Antivirus detection for dropped file 12->81 83 Multi AV Scanner detection for dropped file 12->83 85 Detected unpacking (changes PE section rights) 12->85 87 5 other signatures 12->87 26 SkWcsk.exe 12->26         started        signatures6 process7 dnsIp8 35 C:\Users\user\Desktop#irjlkjas.exe, PE32 19->35 dropped 71 Hides threads from debuggers 19->71 28 Desktop#irjlkjas.exe 19->28         started        51 docs.google.com 142.250.186.46, 443, 49744, 49745 GOOGLEUS United States 23->51 53 freedns.afraid.org 69.42.215.252, 49747, 80 AWKNET-LLCUS United States 23->53 57 2 other IPs or domains 23->57 37 C:\Users\user\Documents\BNAGMGSPLO\~$cache1, PE32 23->37 dropped 73 Antivirus detection for dropped file 23->73 75 Multi AV Scanner detection for dropped file 23->75 77 Drops PE files to the document folder of the user 23->77 79 2 other signatures 23->79 55 154.23.176.145, 50207, 8087 COGENT-174US United States 26->55 file9 signatures10 process11 file12 47 C:\Windows\SysWOW64\SkWcsk.exe, PE32 28->47 dropped 89 Antivirus detection for dropped file 28->89 91 Multi AV Scanner detection for dropped file 28->91 93 Detected unpacking (changes PE section rights) 28->93 95 3 other signatures 28->95 32 cmd.exe 28->32         started        signatures13 process14 signatures15 59 Uses ping.exe to sleep 32->59 61 Uses ping.exe to check the status of other devices and networks 32->61
Threat name:
Win32.Backdoor.DarkComet
Status:
Malicious
First seen:
2022-01-25 02:45:41 UTC
File Type:
PE (Exe)
Extracted files:
69
AV detection:
26 of 27 (96.30%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig macro miner persistence
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Enumerates connected drives
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Suspicious Office macro
xmrig
Unpacked files
SH256 hash:
2cca198f3df8df666ffa119ab80002d971d3a256fc61fa84718bc65459fcb46e
MD5 hash:
e660b5673809f4946470e28b1fe51e43
SHA1 hash:
8dabf9ef86f7ae67de82fc3df7b1883ce10abc06
SH256 hash:
a3c743f00e4cf6e8a71132c43ecda56aa86a773df375c62bc7b347bdd05ea4c4
MD5 hash:
2359ae761e83185f3e669965845b25d2
SHA1 hash:
c96e17fac8abf010d0c97d29d1caf947f9d4236f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe a3c743f00e4cf6e8a71132c43ecda56aa86a773df375c62bc7b347bdd05ea4c4

(this sample)

  
Delivery method
Distributed via web download

Comments