MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ad1ad132f797904f3c28ee03171726fa380e4eabb0ce08b596807da7fefe64e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
CoinMiner
Vendor detections: 13
| SHA256 hash: | ad1ad132f797904f3c28ee03171726fa380e4eabb0ce08b596807da7fefe64e2 |
|---|---|
| SHA3-384 hash: | 110cdc1914f462b1bc61826c9d403c462140f7193899082e432ab1d3154aed9c9cb1dd8fc3828263c7c8df8153d9bd55 |
| SHA1 hash: | c58bf2f049d6f3dd4bc626d3ffc937f13720e32b |
| MD5 hash: | 3ac746ed378dcef916db643d7fe2674c |
| humanhash: | venus-charlie-bacon-florida |
| File name: | Setup.exe |
| Download: | download sample |
| Signature | CoinMiner |
| File size: | 811'837 bytes |
| First seen: | 2023-01-21 22:31:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4911d55129019d132ffed8928b2782b0 (1 x CoinMiner, 1 x ArkeiStealer) |
| ssdeep | 12288:zF7Uq/mzw3kP/Ajw4ZrLpCXiqTp6om8iOc5L4tIV:zF7x+6M/AjwMdkiqTp6oliOcT |
| Threatray | 1'667 similar samples on MalwareBazaar |
| TLSH | T134059F5F3912967BCDC6AF7773954EB3B95C19290588CF32BEC7291C92382C428B5632 |
| TrID | 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 21.3% (.EXE) Win64 Executable (generic) (10523/12/4) 13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 10.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 9.1% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | a8e0b697e6cadaf2 (1 x CoinMiner, 1 x LummaStealer, 1 x Vidar) |
| Reporter | |
| Tags: | CoinMiner exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
242
Origin country :
DEVendor Threat Intelligence
Malware family:
vidar
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2023-01-21 22:29:42 UTC
Tags:
trojan stealer vidar
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a process from a recently created file
Changing a file
Creating a file in the %AppData% directory
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a custom TCP request
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Stealing user critical data
Sending an HTTP POST request to an infection source
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
overlay packed shelma
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
Vidar, Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Drops executable to a common third party application directory
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potential dropper URLs found in powershell memory
Sample is not signed and drops a device driver
Self deletion via cmd or bat file
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2023-01-21 22:32:07 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
19 of 26 (73.08%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 1'657 additional samples on MalwareBazaar
Result
Malware family:
xmrig
Score:
10/10
Tags:
family:vidar family:xmrig botnet:835 discovery evasion miner spyware stealer
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Checks processor information in registry
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner payload
Vidar
xmrig
Malware Config
C2 Extraction:
https://t.me/jetbim
https://steamcommunity.com/profiles/76561199471266194
https://steamcommunity.com/profiles/76561199471266194
Unpacked files
SH256 hash:
c70d654d24d2435b7b7bdebaec045e182c0310c28100e99a2ab6a3f4aa83493b
MD5 hash:
7788ebab317b4c33474bd97ac646d73e
SHA1 hash:
421bac6a4edf64e60f9bceecc1f0d403ff85eb6f
SH256 hash:
ad1ad132f797904f3c28ee03171726fa380e4eabb0ce08b596807da7fefe64e2
MD5 hash:
3ac746ed378dcef916db643d7fe2674c
SHA1 hash:
c58bf2f049d6f3dd4bc626d3ffc937f13720e32b
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.