MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c75fdfe8b519b4d33a5ba92127da6e08170010b1446fa855191936497421c260. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: c75fdfe8b519b4d33a5ba92127da6e08170010b1446fa855191936497421c260
SHA3-384 hash: 3328d5e356691b71c388b5ab65d12dc0d267344c8aea15dcbc47439ca2ff1b0574e53e2ec4d6eb6f79c946cfcd61c3fa
SHA1 hash: 56cd22aeef30f683ad0d2cc041706194cf3def97
MD5 hash: 18887475d2211fed916078c0454e599e
humanhash: indigo-king-hydrogen-mexico
File name:XMR.exe
Download: download sample
Signature CoinMiner
File size:2'332'160 bytes
First seen:2022-06-10 08:30:50 UTC
Last seen:2022-06-10 09:50:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b500cd27f2d6aaa1b9cb12ef098f77c2 (1 x CoinMiner)
ssdeep 49152:DvsGJWR17dGx9re8F2rRTv4scjpjnXrxZymKWR:gGAwre80rRDFctjNZymKi
Threatray 167 similar samples on MalwareBazaar
TLSH T1C0B512000A8F6C5FD893BD399B70DE9B80F21E245D1B8532B9A13D69BBF664335612C7
TrID 50.8% (.EXE) Win32 EXE PECompact compressed (v2.x) (59069/9/14)
35.7% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
4.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
1.7% (.EXE) OS/2 Executable (generic) (2029/13)
dhash icon 8eb2c096b080c28c (8 x CoinMiner, 2 x Downloader.Upatre, 1 x SystemBC)
Reporter obfusor
Tags:CoinMiner exe miner

Intelligence


File Origin
# of uploads :
2
# of downloads :
711
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
XMR.exe
Verdict:
No threats detected
Analysis date:
2022-06-10 09:05:42 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Creating a file in the Windows subdirectories
DNS request
Sending an HTTP GET request
Creating a service
Launching a service
Creating a process from a recently created file
Creating a file in the Windows directory
Loading a system driver
Running batch commands
Creating a process with a hidden window
Creating a file in the %temp% directory
Creating a file
Sending a custom TCP request
Enabling autorun for a service
Moving of the original file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.adwa.evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the startup folder
Found strings related to Crypto-Mining
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Moves itself to temp directory
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sigma detected: Xmrig
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Uses known network protocols on non-standard ports
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 643177 Sample: XMR.exe Startdate: 10/06/2022 Architecture: WINDOWS Score: 100 54 Snort IDS alert for network traffic 2->54 56 Sigma detected: Xmrig 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 11 other signatures 2->60 7 XMR.exe 16 2->7         started        12 NVDisplay.exe 1 2->12         started        14 start.exe 2->14         started        16 start.exe 2->16         started        process3 dnsIp4 48 lianjie666.ddns.me 119.96.97.235, 49755, 49765, 49766 CHINATELECOM-HUBEI-IDCCHINANETHubeiprovincenetworkCN China 7->48 38 C:\Windows\SysWOW64\XMR\xmrig.exe, PE32+ 7->38 dropped 40 C:\Windows\SysWOW64\XMR\start.exe, PE32 7->40 dropped 42 C:\Windows\SysWOW64\XMR42VDisplay.exe, PE32 7->42 dropped 46 2 other files (1 malicious) 7->46 dropped 72 Detected unpacking (changes PE section rights) 7->72 74 Moves itself to temp directory 7->74 76 Drops executables to the windows directory (C:\Windows) and starts them 7->76 18 start.exe 2 1 7->18         started        22 cmd.exe 1 7->22         started        44 C:\Windows\ceGMVogd.dat, PE32+ 12->44 dropped 78 Antivirus detection for dropped file 12->78 80 Multi AV Scanner detection for dropped file 12->80 82 Machine Learning detection for dropped file 12->82 84 Tries to detect virtualization through RDTSC time measurements 12->84 24 cmd.exe 1 12->24         started        file5 86 Detected Stratum mining protocol 48->86 signatures6 process7 file8 36 C:\ProgramData\Microsoft\...\start.exe, PE32 18->36 dropped 62 Antivirus detection for dropped file 18->62 64 Multi AV Scanner detection for dropped file 18->64 66 Machine Learning detection for dropped file 18->66 68 Drops PE files to the startup folder 18->68 26 install_wim_tweak.exe 1 22->26         started        28 conhost.exe 22->28         started        70 Drops executables to the windows directory (C:\Windows) and starts them 24->70 30 xmrig.exe 1 24->30         started        34 conhost.exe 24->34         started        signatures9 process10 dnsIp11 50 xmdxr323001.ddns.me 43.226.153.7, 49770, 6666 CHINANET-LIAONING-DALIAN-MANCHINANETLiaoningprovinceDali China 30->50 52 192.168.2.1 unknown unknown 30->52 88 Antivirus detection for dropped file 30->88 90 Multi AV Scanner detection for dropped file 30->90 92 Query firmware table information (likely to detect VMs) 30->92 94 Machine Learning detection for dropped file 30->94 signatures12
Threat name:
Win32.Trojan.DisguisedXMRigMiner
Status:
Malicious
First seen:
2021-12-10 18:29:42 UTC
File Type:
PE (Exe)
Extracted files:
351
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig bootkit miner persistence
Behaviour
Modifies data under HKEY_USERS
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Writes to the Master Boot Record (MBR)
Loads dropped DLL
Executes dropped EXE
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
afbf22880d0129f8b11b1a5876f175c874f52c8572cb5c4beda3c528241a8e6c
MD5 hash:
ba352663c76c86c10a8d5c7b7a47f3c5
SHA1 hash:
61337aec0dad3d993f862a2d6499a185cbe46431
SH256 hash:
e4e2c4af370e6587450c6914d3482ba9b130482d138301b40ff25d962f9335d3
MD5 hash:
afabb305d1dafc31504aa4443f346e0f
SHA1 hash:
3accaf452800670fa80abcee2ae263b011294ffc
SH256 hash:
c75fdfe8b519b4d33a5ba92127da6e08170010b1446fa855191936497421c260
MD5 hash:
18887475d2211fed916078c0454e599e
SHA1 hash:
56cd22aeef30f683ad0d2cc041706194cf3def97
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments