MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b93bc07850c2c22986d7b4408131bd34d0fea6f1867933732ae13624fee5fd76. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: b93bc07850c2c22986d7b4408131bd34d0fea6f1867933732ae13624fee5fd76
SHA3-384 hash: 8de0c76cc0e41acb4125c02f5a416f9db7bcf5e296bbf82a238e1389c1411237285d7036087a3906b12926194bae128f
SHA1 hash: 8ed298baa95e01f48ccb314331bee08df572ba8d
MD5 hash: d1c8cab62ee02ec699f2b4949c0e8b8f
humanhash: fifteen-nineteen-single-floor
File name:d1c8cab62ee02ec699f2b4949c0e8b8f
Download: download sample
Signature CoinMiner
File size:2'091'008 bytes
First seen:2021-09-02 00:45:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 49152:swqknt3EUVC3SWgm4D1NOJ2nN17+w+d3aB2nRib7Tjeh4b:2iTm6uwiaA6
Threatray 193 similar samples on MalwareBazaar
TLSH T192A533E32DEB12AFF17852F669B0E1530B1C9515507F9BF0B11A93C62707168BC0AAF9
Reporter zbetcheckin
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d1c8cab62ee02ec699f2b4949c0e8b8f
Verdict:
No threats detected
Analysis date:
2021-09-02 00:48:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Launching a process
DNS request
Sending a UDP request
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Creating a process with a hidden window
Creating a file
Creating a process from a recently created file
Creating a file in the system32 directory
Creating a file in the system32 subdirectories
Connection attempt
Sending a custom TCP request
Connecting to a cryptocurrency mining pool
Creating a service
Launching a service
Loading a system driver
Unauthorized injection to a recently created process
Enabling autorun for a service
Enabling autorun by creating a file
Unauthorized injection to a system process
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
BitCoin Miner Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Xmrig
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitCoin Miner
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 476152 Sample: VU0f1A8xpe Startdate: 02/09/2021 Architecture: WINDOWS Score: 100 115 Sigma detected: Xmrig 2->115 117 Malicious sample detected (through community Yara rule) 2->117 119 Multi AV Scanner detection for submitted file 2->119 121 8 other signatures 2->121 10 VU0f1A8xpe.exe 5 2->10         started        14 services64.exe 3 2->14         started        16 svchost.exe 2->16         started        18 9 other processes 2->18 process3 dnsIp4 93 C:\Users\user\AppData\...\VU0f1A8xpe.exe.log, ASCII 10->93 dropped 141 Adds a directory exclusion to Windows Defender 10->141 21 cmd.exe 1 10->21         started        23 cmd.exe 1 10->23         started        95 C:\Users\user\AppData\Local\...\svchost64.exe, PE32+ 14->95 dropped 143 Multi AV Scanner detection for dropped file 14->143 145 Machine Learning detection for dropped file 14->145 26 cmd.exe 14->26         started        28 cmd.exe 14->28         started        147 Changes security center settings (notifications, updates, antivirus, firewall) 16->147 105 127.0.0.1 unknown unknown 18->105 107 192.168.2.1 unknown unknown 18->107 file5 signatures6 process7 signatures8 30 svchost64.exe 6 21->30         started        34 conhost.exe 21->34         started        125 Uses schtasks.exe or at.exe to add and modify task schedules 23->125 127 Adds a directory exclusion to Windows Defender 23->127 36 powershell.exe 23 23->36         started        38 conhost.exe 23->38         started        40 powershell.exe 23->40         started        46 2 other processes 23->46 42 svchost64.exe 26->42         started        44 conhost.exe 26->44         started        48 5 other processes 28->48 process9 file10 97 C:\Windows\System32\services64.exe, PE32+ 30->97 dropped 99 C:\Windows\...\services64.exe:Zone.Identifier, ASCII 30->99 dropped 149 Multi AV Scanner detection for dropped file 30->149 151 Machine Learning detection for dropped file 30->151 153 Drops executables to the windows directory (C:\Windows) and starts them 30->153 155 Contains functionality to inject code into remote processes 30->155 50 cmd.exe 30->50         started        52 services64.exe 3 30->52         started        55 cmd.exe 1 30->55         started        101 C:\Windows\System32\...\sihost64.exe, PE32+ 42->101 dropped 103 C:\Windows\System32\Microsoft\Libs\WR64.sys, PE32+ 42->103 dropped 157 Injects code into the Windows Explorer (explorer.exe) 42->157 159 Writes to foreign memory regions 42->159 161 Allocates memory in foreign processes 42->161 163 3 other signatures 42->163 signatures11 process12 signatures13 57 explorer.exe 50->57         started        61 sihost64.exe 50->61         started        63 cmd.exe 50->63         started        73 3 other processes 50->73 123 Adds a directory exclusion to Windows Defender 52->123 65 cmd.exe 52->65         started        67 MpCmdRun.exe 55->67         started        69 conhost.exe 55->69         started        71 schtasks.exe 1 55->71         started        process14 dnsIp15 109 94.23.23.52, 49707, 7777 OVHFR France 57->109 111 raw.githubusercontent.com 185.199.108.133, 443, 49706 FASTLYUS Netherlands 57->111 113 3 other IPs or domains 57->113 129 System process connects to network (likely due to code injection or exploit) 57->129 131 Query firmware table information (likely to detect VMs) 57->131 133 Tries to detect sandboxes and other dynamic analysis tools (window names) 57->133 135 Multi AV Scanner detection for dropped file 61->135 75 conhost.exe 63->75         started        77 schtasks.exe 63->77         started        137 Adds a directory exclusion to Windows Defender 65->137 79 conhost.exe 65->79         started        81 powershell.exe 65->81         started        83 powershell.exe 65->83         started        91 2 other processes 65->91 85 conhost.exe 67->85         started        87 conhost.exe 73->87         started        89 choice.exe 73->89         started        signatures16 139 Detected Stratum mining protocol 109->139 process17
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-24 01:23:29 UTC
AV detection:
31 of 45 (68.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Executes dropped EXE
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
b93bc07850c2c22986d7b4408131bd34d0fea6f1867933732ae13624fee5fd76
MD5 hash:
d1c8cab62ee02ec699f2b4949c0e8b8f
SHA1 hash:
8ed298baa95e01f48ccb314331bee08df572ba8d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe b93bc07850c2c22986d7b4408131bd34d0fea6f1867933732ae13624fee5fd76

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-02 00:45:48 UTC

url : hxxp://9ixz.dimluui.ru/969020.exe