MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c2f28c09684df67950e22ac326f6e523f02db15fcc822244f8889b76fbd86ad7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 10


Intelligence 10 IOCs 3 YARA 6 File information Comments

SHA256 hash: c2f28c09684df67950e22ac326f6e523f02db15fcc822244f8889b76fbd86ad7
SHA3-384 hash: 1bf4c875b1d98494b5ac2c6e17a51ec220308d0708c5a81317640182378c53a23e41bc3990a0ecebe331873afe55f7d1
SHA1 hash: d664f13daa2907dfdccab5d6628bcdb2b5e2222b
MD5 hash: 5f0a9910cbd57c9fa69c2ed2f484d4a1
humanhash: carbon-fourteen-bulldog-alaska
File name:5F0A9910CBD57C9FA69C2ED2F484D4A1.exe
Download: download sample
Signature CoinMiner
File size:4'115'539 bytes
First seen:2021-06-08 07:04:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e7f9a29f2c85394521a08b9f31f6275 (293 x GuLoader, 51 x VIPKeylogger, 48 x RemcosRAT)
ssdeep 98304:J55pi396HjeeHPtzAK9Ci1IM9JDMOZsAXDU5JG/XKijiqo+6dPrVqlvU:J55C9GqeP9CizGOZs8DSJc5iNP8NU
Threatray 38 similar samples on MalwareBazaar
TLSH 5C1633A9FF41C45ACAC19234064AB73F28BA6D295075D55EC321624AEF1FD2C6A0FF07
Reporter abuse_ch
Tags:CoinMiner exe


Avatar
abuse_ch
CoinMiner C2:
185.141.27.166:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.141.27.166:80 https://threatfox.abuse.ch/ioc/73616/
195.201.17.219:25524 https://threatfox.abuse.ch/ioc/73619/
109.248.175.222:80 https://threatfox.abuse.ch/ioc/73620/

Intelligence


File Origin
# of uploads :
1
# of downloads :
296
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5F0A9910CBD57C9FA69C2ED2F484D4A1.exe
Verdict:
No threats detected
Analysis date:
2021-06-08 07:05:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Searching for the window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Running batch commands
Deleting a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
DLL reload attack detected
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sample is protected by VMProtect
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Glupteba
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 430935 Sample: cdwoTY6HPY.exe Startdate: 08/06/2021 Architecture: WINDOWS Score: 100 140 8.211.6.12 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 2->140 142 217.107.34.191 RTCOMM-ASRU Russian Federation 2->142 144 104.21.40.195 CLOUDFLARENETUS United States 2->144 206 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->206 208 Antivirus detection for URL or domain 2->208 210 Antivirus detection for dropped file 2->210 212 13 other signatures 2->212 13 cdwoTY6HPY.exe 9 2->13         started        signatures3 process4 file5 104 C:\Users\user\AppData\...\setup_installer.exe, PE32 13->104 dropped 16 setup_installer.exe 16 13->16         started        process6 file7 96 C:\Users\user\AppData\...\setup_install.exe, PE32 16->96 dropped 98 C:\Users\user\AppData\Local\...\metina_8.exe, PE32 16->98 dropped 100 C:\Users\user\AppData\Local\...\metina_7.exe, PE32 16->100 dropped 102 11 other files (6 malicious) 16->102 dropped 19 setup_install.exe 1 16->19         started        process8 dnsIp9 146 mazama.xyz 172.67.154.4, 49702, 80 CLOUDFLARENETUS United States 19->146 148 127.0.0.1 unknown unknown 19->148 214 Detected unpacking (changes PE section rights) 19->214 216 Performs DNS queries to domains with low reputation 19->216 23 cmd.exe 1 19->23         started        25 cmd.exe 19->25         started        27 cmd.exe 1 19->27         started        29 8 other processes 19->29 signatures10 process11 process12 31 metina_1.exe 7 23->31         started        35 metina_7.exe 25->35         started        38 metina_3.exe 86 27->38         started        40 metina_4.exe 3 2 29->40         started        42 metina_5.exe 29->42         started        44 metina_2.exe 1 29->44         started        46 2 other processes 29->46 dnsIp13 122 3 other files (1 malicious) 31->122 dropped 176 Antivirus detection for dropped file 31->176 48 rundll32.exe 31->48         started        150 212.192.241.136 RAPMSB-ASRU Russian Federation 35->150 158 3 other IPs or domains 35->158 114 C:\Users\...\DCAMCMHIGTTQ9PGZ92ADITB2.exe, PE32 35->114 dropped 124 7 other files (none is malicious) 35->124 dropped 178 Machine Learning detection for dropped file 35->178 51 cmd.exe 35->51         started        53 cmd.exe 35->53         started        55 cmd.exe 35->55         started        67 6 other processes 35->67 160 2 other IPs or domains 38->160 126 12 other files (none is malicious) 38->126 dropped 180 Detected unpacking (changes PE section rights) 38->180 182 Detected unpacking (overwrites its own PE header) 38->182 184 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 38->184 196 2 other signatures 38->196 152 ip-api.com 208.95.112.1, 49705, 80 TUT-ASUS United States 40->152 162 2 other IPs or domains 40->162 128 2 other files (1 malicious) 40->128 dropped 186 May check the online IP address of the machine 40->186 57 jfiag3g_gg.exe 40->57         started        59 jfiag3g_gg.exe 40->59         started        116 C:\Users\user\AppData\Local\...\metina_5.tmp, PE32 42->116 dropped 61 metina_5.tmp 42->61         started        118 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 44->118 dropped 188 DLL reload attack detected 44->188 190 Renames NTDLL to bypass HIPS 44->190 192 Checks if the current machine is a virtual machine (disk enumeration) 44->192 65 explorer.exe 44->65 injected 154 101.36.107.74, 49704, 80 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 46->154 156 172.67.206.72 CLOUDFLARENETUS United States 46->156 120 C:\Users\user\Documents\...\metina_8.exe, PE32 46->120 dropped 130 2 other files (none is malicious) 46->130 dropped 194 Drops PE files to the document folder of the user 46->194 file14 signatures15 process16 dnsIp17 198 Writes to foreign memory regions 48->198 200 Allocates memory in foreign processes 48->200 202 Creates a thread in another existing process (thread injection) 48->202 69 svchost.exe 48->69 injected 72 svchost.exe 48->72 injected 74 DCAMCMHIGTTQ9PGZ92ADITB2.exe 51->74         started        76 conhost.exe 51->76         started        84 2 other processes 53->84 86 2 other processes 55->86 204 Tries to harvest and steal browser information (history, passwords, etc) 57->204 166 limesfile.com 198.54.126.101, 49708, 80 NAMECHEAP-NETUS United States 61->166 168 192.168.2.1 unknown unknown 61->168 106 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 61->106 dropped 108 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 61->108 dropped 110 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 61->110 dropped 112 C:\Users\user\AppData\...\67________F.exe, PE32 61->112 dropped 78 67________F.exe 61->78         started        82 haleng.exe 65->82         started        88 6 other processes 67->88 file18 signatures19 process20 dnsIp21 218 System process connects to network (likely due to code injection or exploit) 69->218 220 Sets debug register (to hijack the execution of another thread) 69->220 222 Modifies the context of a thread in another process (thread injection) 69->222 90 svchost.exe 69->90         started        224 Query firmware table information (likely to detect VMs) 74->224 226 Tries to detect sandboxes and other dynamic analysis tools (window names) 74->226 228 Hides threads from debuggers 74->228 230 Tries to detect sandboxes / dynamic malware analysis system (registry check) 74->230 170 198.54.116.159 NAMECHEAP-NETUS United States 78->170 172 8.238.29.126 LEVEL3US United States 78->172 174 162.0.210.44 ACPCA Canada 78->174 132 C:\Users\user\AppData\...\Pufesepyny.exe, PE32 78->132 dropped 134 C:\Program Files (x86)\...\Laedaesysimi.exe, PE32 78->134 dropped 136 C:\Users\user\...\Pufesepyny.exe.config, XML 78->136 dropped 138 3 other files (1 malicious) 78->138 dropped 94 jfiag3g_gg.exe 82->94         started        file22 signatures23 process24 dnsIp25 164 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 90->164 232 Query firmware table information (likely to detect VMs) 90->232 signatures26
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-06-05 03:59:12 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:plugx family:redline family:smokeloader family:vidar botnet:kolya botnet:subnew aspackv2 backdoor infostealer persistence spyware stealer themida trojan upx vmprotect
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
PlugX
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
195.201.17.219:25524
cengonic.xyz:80
Unpacked files
SH256 hash:
f7a22d383fb7c74e0e9b4b3907eeaf44acae4fe4a741face453d107eadd9ccfe
MD5 hash:
aabc7a3044ba7ea1594c0eab199d9547
SHA1 hash:
8d4143739f9c32c66ad6ac096cec8b6725f20218
SH256 hash:
1bb1e726362311c789fdfd464f12e72c279fb3ad639d27338171d16e73360e7c
MD5 hash:
428557b1005fd154585af2e3c721e402
SHA1 hash:
3fc4303735f8355f787f3181d69450423627b5c9
SH256 hash:
4739d353297aa19f07825612eb05ff6287a5fdd070e18efe54e85f4a072cbea7
MD5 hash:
c7bbc9eabb785b39bab583534c7caed5
SHA1 hash:
e8d4109eee18a54bad6dcea59e62e145c80e4883
SH256 hash:
65f2f25605293e7bf58f784719bacd988560acbc9785ae54317c39c5303c43f0
MD5 hash:
1a709dd18eb2fcfff50f0255b89d430b
SHA1 hash:
fbc73199d8f4c26bfe7b902d5aa183bbbbc0fa85
SH256 hash:
9208e495a8c36de38c8d48f31fb6d6cf5fda3a508a0f950f5cac5f34730798ed
MD5 hash:
4695e4859403ee7c907061bb2ee6bc78
SHA1 hash:
ee96ff74edc9ff438f7f2dacfe63f3ceccaa38aa
SH256 hash:
16124fbcd8e2adcbddbc59292e8aed1457b1d7010457967fb0eb5e902cab8c54
MD5 hash:
0924f287cd3f256ac4cb3605dd105ffc
SHA1 hash:
e10eb9fec8dd000f29a5013d1806fc6b018ea341
SH256 hash:
d19808c396ba4a44568024be9266beee7442d26da23c2a372f7707c0b8232d8a
MD5 hash:
244925bfacb9a951c3cb1bf346b8372c
SHA1 hash:
d02440131939fe73f6e6ae161ffb98cb1e8e1f11
SH256 hash:
199b290703e943f94e362c68d1dd42e5195a2ed2981a2960e55728aa3b6537c3
MD5 hash:
98a8126ef1938a54944e5f4b094f6c5c
SHA1 hash:
a2fb3a7ea878ddda8197dbc26120f7a37c303a4b
SH256 hash:
eb3691d3a707c8b1d5b45402ef3344d7e6388eaac64065a13cf5c9afa53a2b01
MD5 hash:
3038ae600c1657fad2fdc1a3072820d2
SHA1 hash:
6a855667f0219302dbe1ab2c80feb56c8822051b
SH256 hash:
323c99b80a57d73e455338fde545b2313d53423c56273e24d0975083d2e2a8a9
MD5 hash:
aecae1479056d5d031f4214b44c83ec1
SHA1 hash:
5bdd20bbd84c4960f492a5012a702c22293d394e
SH256 hash:
32ecbb31b795b66ace206da2ca93e22f05a002d070ba5a5965bf89c0c91beb82
MD5 hash:
be891367a9a7f020097506d3e964bd08
SHA1 hash:
4ae27f5a2ec7c7aa26ca725d79397e4645c807c6
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
679b349f53294cd3e3fb4e2406309ca0621a037dc7c81ad4fc455a34c843303f
MD5 hash:
6dc328b0f7c49d1b5336776967b886bc
SHA1 hash:
f89f5e6b8c32115bf4a5f0fdbe80096dfb260519
SH256 hash:
e32f10235c9f4c5425f4be396aab3ae69389fb8bcc1dcb59866d96c0bd63a8d8
MD5 hash:
dfa4dbf54400b02d0e94ba615e3f7242
SHA1 hash:
06094db085100489bc0a4b0af496b0647b0b2828
SH256 hash:
6ccc5a3dc4f1a536c76eb28615a3fa2a916a12ecb317852ec961441f2a51da21
MD5 hash:
c5eeba178644af3c78b75ea92aa94938
SHA1 hash:
7a586249e99cc2fef2de53fca9438e3893c9b004
SH256 hash:
936a00053220fd3c0a2e4b6d009cea99a5df3cdb0d6ec61c851406537f48ffa9
MD5 hash:
b431cf81b4eda07b17f5d42b482e0dc9
SHA1 hash:
4f4ca14279ce2370085f53c4d19f59cb70016011
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
080c1b5398699668e24a1ea7bd7d3bae38a94261cd8ae44c39a1230e6c05a2bf
MD5 hash:
b1171754eea1521db7df4cde412dd01c
SHA1 hash:
4f317bf090f07bed42d1ff21ddbfa6fe53c8f2bc
SH256 hash:
c2f28c09684df67950e22ac326f6e523f02db15fcc822244f8889b76fbd86ad7
MD5 hash:
5f0a9910cbd57c9fa69c2ed2f484d4a1
SHA1 hash:
d664f13daa2907dfdccab5d6628bcdb2b5e2222b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments