MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c0243843ad83a16bc3c9fe59f8d530aee08fbe163b45cf676c4327d1f2a0a6fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 15


Intelligence 15 IOCs YARA 17 File information Comments

SHA256 hash: c0243843ad83a16bc3c9fe59f8d530aee08fbe163b45cf676c4327d1f2a0a6fb
SHA3-384 hash: 7fe49fb194353b5e8c096b33d1822649390acfbc2c8e596366281998b2f3197a025409a8ad550133d115513ef78e7cce
SHA1 hash: 5a4ab23846c5425abba98c24009c561a787dadfb
MD5 hash: 9b2514f290b0e5fe4cd2e6f1745ea188
humanhash: lithium-california-bakerloo-summer
File name:file.exe
Download: download sample
Signature CoinMiner
File size:1'952'768 bytes
First seen:2023-05-09 00:04:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bbac62fd99326ea68ec5a33b36925dd1 (46 x AgentTesla, 38 x njrat, 27 x Formbook)
ssdeep 49152:Wkwkn9IMHeaA5bCshNwynVIQwMlw1yYtor6KadBaPCS:VdnV3AXVLwMlwJo2vGPC
Threatray 526 similar samples on MalwareBazaar
TLSH T18395F10263DDC3A4C7725273BA66BB01AEBF7C2506B1F49B2FD4053DE960162521EA73
TrID 85.7% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
4.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
2.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.9% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter Chainskilabs
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
293
Origin country :
CO CO
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file.exe
Verdict:
Malicious activity
Analysis date:
2023-05-09 00:07:41 UTC
Tags:
miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Creating a file in the %AppData% directory
Sending a custom TCP request
Unauthorized injection to a recently created process
Сreating synchronization primitives
Launching a process
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckNumberOfProcessor
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit greyware keylogger packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to modify clipboard data
Detected Stratum mining protocol
Detected unpacking (creates a PE file in dynamic memory)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 861720 Sample: file.exe Startdate: 09/05/2023 Architecture: WINDOWS Score: 100 42 Antivirus detection for dropped file 2->42 44 Antivirus / Scanner detection for submitted sample 2->44 46 Multi AV Scanner detection for dropped file 2->46 48 4 other signatures 2->48 7 file.exe 3 2->7         started        process3 file4 20 C:\...\blsncxvoxmotpljzrxtwkmpap5606009.png, COM 7->20 dropped 22 C:\Users\user\AppData\Local\...\autF235.tmp, COM 7->22 dropped 50 Detected unpacking (creates a PE file in dynamic memory) 7->50 52 Contains functionality to modify clipboard data 7->52 54 Injects a PE file into a foreign processes 7->54 11 file.exe 1 4 7->11         started        signatures5 process6 dnsIp7 36 149.210.249.142, 11119 TRANSIP-ASAmsterdamtheNetherlandsNL Netherlands 11->36 24 C:\ProgramData\zmWLVbyRgm\lsas.exe, PE32 11->24 dropped 26 C:\ProgramData\zmWLVbyRgm\cfgi, JSON 11->26 dropped 28 C:\ProgramData\zmWLVbyRgm\cfg, JSON 11->28 dropped 56 Monitors registry run keys for changes 11->56 58 Writes to foreign memory regions 11->58 60 Allocates memory in foreign processes 11->60 62 3 other signatures 11->62 16 notepad.exe 11->16         started        file8 signatures9 process10 dnsIp11 30 141.94.96.195, 49702, 49704, 49705 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 16->30 32 141.94.96.71, 49700, 49701, 49703 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 16->32 34 2 other IPs or domains 16->34 38 System process connects to network (likely due to code injection or exploit) 16->38 signatures12 40 Detected Stratum mining protocol 32->40
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2018-06-04 15:42:00 UTC
File Type:
PE (Exe)
Extracted files:
23
AV detection:
28 of 37 (75.68%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
XMRig Miner payload
xmrig
Unpacked files
SH256 hash:
2b0604da9e045794bbdd00dc432542c873ba0f013f826601480cfb62006944a3
MD5 hash:
64888bd1becea06a22f69aeb2ae7f192
SHA1 hash:
9e8cdbe2433ecf9b70aa48dc96b16599c22fab29
SH256 hash:
f1ddd998327f3740d81337e7b7daa83b98aa4dd994bb2fb4f27c7e87012a5f64
MD5 hash:
9d1d7dc72fc0a328157d50790efe0e16
SHA1 hash:
54770533536ad9a687cf747a25a7eb103b79ee3b
SH256 hash:
c0243843ad83a16bc3c9fe59f8d530aee08fbe163b45cf676c4327d1f2a0a6fb
MD5 hash:
9b2514f290b0e5fe4cd2e6f1745ea188
SHA1 hash:
5a4ab23846c5425abba98c24009c561a787dadfb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:CoinMiner_Strings
Author:Florian Roth (Nextron Systems)
Description:Detects mining pool protocol string in Executable
Reference:https://minergate.com/faq/what-pool-address
Rule name:HeavensGate
Author:kevoreilly
Description:Heaven's Gate: Switch from 32-bit to 64-mode
Rule name:Linux_Cryptominer_Xmrig_af809eea
Author:Elastic Security
Rule name:MacOS_Cryptominer_Generic_333129b7
Author:Elastic Security
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MINER_monero_mining_detection
Author:Trellix ATR team
Description:Monero mining software
Rule name:PUA_Crypto_Mining_CommandLine_Indicators_Oct21
Author:Florian Roth (Nextron Systems)
Description:Detects command line parameters often used by crypto mining software
Reference:https://www.poolwatch.io/coin/monero
Rule name:PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20
Author:Florian Roth (Nextron Systems)
Description:Detects XMRIG crypto coin miners
Reference:https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
Rule name:PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20_RID33BA
Author:Florian Roth
Description:Detects XMRIG crypto coin miners
Reference:https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
Rule name:QbotStuff
Author:anonymous
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:SUSP_XMRIG_String
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious XMRIG crypto miner executable string in filr
Reference:Internal Research
Rule name:SUSP_XMRIG_String_RID2D18
Author:Florian Roth
Description:Detects a suspicious XMRIG crypto miner executable string in filr
Reference:Internal Research
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases
Rule name:XMRIG_Monero_Miner_RID2DC1
Author:Florian Roth
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe c0243843ad83a16bc3c9fe59f8d530aee08fbe163b45cf676c4327d1f2a0a6fb

(this sample)

  
Delivery method
Distributed via web download

Comments