MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bcc7c88a78159d256da9838d8148b61bf92057b71eabf3bed83ed650d723562c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments 1

SHA256 hash: bcc7c88a78159d256da9838d8148b61bf92057b71eabf3bed83ed650d723562c
SHA3-384 hash: 1ce19d2a9909f4b631e422934943121f285328948b0637e563a2edbd09faf13551727f95d07fcec674bce1efe08f31ee
SHA1 hash: d84db7c505eb55d6fda2d7b7145a431ecc9e6061
MD5 hash: d2c73b170d0f9669214cd74ae6128068
humanhash: vermont-pennsylvania-september-video
File name:d2c73b170d0f9669214cd74ae6128068
Download: download sample
Signature CoinMiner
File size:4'259'468 bytes
First seen:2021-09-28 12:48:06 UTC
Last seen:2021-09-28 14:45:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:l6dD64EdH0ACrs3qk1AXN8sIJn2rsK4Ni:l6dOnDCLkOyse2f4Ni
Threatray 172 similar samples on MalwareBazaar
TLSH T14D1633225E61BA0EECF51732327FBB7C4D2BEC2AA475B3081AA57B1378B1201943B555
File icon (PE):PE icon
dhash icon 686eeee2b292c6ec (6 x njrat, 3 x RedLineStealer, 2 x CoinMiner)
Reporter zbetcheckin
Tags:32 CoinMiner exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d2c73b170d0f9669214cd74ae6128068
Verdict:
No threats detected
Analysis date:
2021-09-28 12:56:35 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Creating a window
Result
Threat name:
BitCoin Miner Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Connects to a pastebin service (likely for C&C)
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Xmrig
System process connects to network (likely due to code injection or exploit)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected BitCoin Miner
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 492273 Sample: Crxo4hstMt Startdate: 28/09/2021 Architecture: WINDOWS Score: 100 106 cryptolegion.duckdns.org 194.36.178.69, 3333, 49773 BELNET-NG-ASUA Czech Republic 2->106 108 pastebin.com 104.23.99.190, 443, 49772 CLOUDFLARENETUS United States 2->108 120 Sigma detected: Xmrig 2->120 122 Malicious sample detected (through community Yara rule) 2->122 124 System process connects to network (likely due to code injection or exploit) 2->124 128 8 other signatures 2->128 12 Crxo4hstMt.exe 20 2->12         started        15 services32.exe 2->15         started        18 splwov.exe 2->18         started        20 5 other processes 2->20 signatures3 126 Detected Stratum mining protocol 106->126 process4 dnsIp5 92 C:\Users\user\AppData\Roaming\wer.exe, PE32+ 12->92 dropped 94 C:\Users\user\AppData\Roaming\kio.exe, PE32+ 12->94 dropped 96 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 12->96 dropped 23 kio.exe 5 12->23         started        26 wer.exe 5 12->26         started        29 cmd.exe 12->29         started        98 C:\Users\user\AppData\Local\...\svchost32.exe, PE32+ 15->98 dropped 144 Multi AV Scanner detection for dropped file 15->144 146 Machine Learning detection for dropped file 15->146 148 Adds a directory exclusion to Windows Defender 15->148 100 C:\Users\user\AppData\Local\...\svchost64.exe, PE32+ 18->100 dropped 110 127.0.0.1 unknown unknown 20->110 file6 signatures7 process8 dnsIp9 130 Multi AV Scanner detection for dropped file 23->130 132 Machine Learning detection for dropped file 23->132 134 Adds a directory exclusion to Windows Defender 23->134 31 cmd.exe 1 23->31         started        33 cmd.exe 1 23->33         started        112 192.168.2.1 unknown unknown 26->112 36 cmd.exe 26->36         started        38 cmd.exe 26->38         started        40 conhost.exe 29->40         started        42 taskkill.exe 29->42         started        signatures10 process11 signatures12 44 svchost32.exe 31->44         started        48 conhost.exe 31->48         started        116 Uses schtasks.exe or at.exe to add and modify task schedules 33->116 118 Adds a directory exclusion to Windows Defender 33->118 50 powershell.exe 23 33->50         started        52 conhost.exe 33->52         started        54 powershell.exe 33->54         started        56 svchost64.exe 36->56         started        58 conhost.exe 36->58         started        60 conhost.exe 38->60         started        62 2 other processes 38->62 process13 file14 102 C:\Windows\System32\services32.exe, PE32+ 44->102 dropped 138 Multi AV Scanner detection for dropped file 44->138 140 Machine Learning detection for dropped file 44->140 142 Drops executables to the windows directory (C:\Windows) and starts them 44->142 64 services32.exe 44->64         started        67 cmd.exe 44->67         started        69 cmd.exe 44->69         started        104 C:\Windows\System32\splwov.exe, PE32+ 56->104 dropped 71 cmd.exe 56->71         started        signatures15 process16 signatures17 114 Adds a directory exclusion to Windows Defender 64->114 73 cmd.exe 64->73         started        76 schtasks.exe 67->76         started        78 conhost.exe 67->78         started        80 conhost.exe 69->80         started        82 choice.exe 69->82         started        84 conhost.exe 71->84         started        86 schtasks.exe 71->86         started        process18 signatures19 136 Adds a directory exclusion to Windows Defender 73->136 88 conhost.exe 73->88         started        90 powershell.exe 73->90         started        process20
Threat name:
ByteCode-MSIL.Trojan.Tasker
Status:
Malicious
First seen:
2021-09-19 03:10:00 UTC
AV detection:
25 of 45 (55.56%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Deletes itself
Loads dropped DLL
Executes dropped EXE
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df
MD5 hash:
ec9c99216ef11cdd85965e78bc797d2c
SHA1 hash:
1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c
SH256 hash:
d5de6937d32e3b6df451bee1fa21e056cab3ece9105ea2ca7522e46dc01d45ca
MD5 hash:
efea9bcaab23000e72cedf0f94f652c6
SHA1 hash:
202dd550d882b0a0cea9ec18e368442e36ffc664
SH256 hash:
bcc7c88a78159d256da9838d8148b61bf92057b71eabf3bed83ed650d723562c
MD5 hash:
d2c73b170d0f9669214cd74ae6128068
SHA1 hash:
d84db7c505eb55d6fda2d7b7145a431ecc9e6061
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_CoinMiner02
Author:ditekSHen
Description:Detects coinmining malware
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe bcc7c88a78159d256da9838d8148b61bf92057b71eabf3bed83ed650d723562c

(this sample)

Comments



Avatar
zbet commented on 2021-09-28 12:48:08 UTC

url : hxxp://squadlegion.crabdance.com/m.exe