MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d6ec737d10afdaf38cafede9fde045dd3ce7bc72c6ee13df33e018f0e7149893. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 15 File information Comments

SHA256 hash: d6ec737d10afdaf38cafede9fde045dd3ce7bc72c6ee13df33e018f0e7149893
SHA3-384 hash: b8d59bf71051f5aa9bb7b1e4daa6b92f5fb1053bdceb58fb7d92f75041734d6f86711f6f6b9f6d07d6bd68cd96134b92
SHA1 hash: a2cbbd31204b050d20573394c6e953115c0e4238
MD5 hash: b2014a589795baf565955d332d5878c2
humanhash: ohio-ohio-washington-seventeen
File name:D6EC737D10AFDAF38CAFEDE9FDE045DD3CE7BC72C6EE1.exe
Download: download sample
Signature CoinMiner
File size:10'164'276 bytes
First seen:2022-09-10 07:15:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JIuEs0v/1ZRp1utK2rY4WhsA/2Yz7HlxY7CKCDg9LJDjema80dIa:JXx03Rvuk8YJmo2Y3Hl27VMgVhemaP7
TLSH T11CA6333BBFD2CD4BE891273D903F2219C78D76A64B683B15A7E5807AF840931905C6BD
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:CoinMiner exe


Avatar
abuse_ch
CoinMiner C2:
45.132.1.99:28337

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.132.1.99:28337 https://threatfox.abuse.ch/ioc/848895/

Intelligence


File Origin
# of uploads :
1
# of downloads :
399
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
D6EC737D10AFDAF38CAFEDE9FDE045DD3CE7BC72C6EE1.exe
Verdict:
No threats detected
Analysis date:
2022-09-10 07:16:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
80%
Tags:
exploit overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Result
Threat name:
Nymaim, Raccoon, RedLine, SmokeLoader, S
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Found C&C like URL pattern
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Yara detected Generic Downloader
Yara detected MSILDownloaderGeneric
Yara detected Nymaim
Yara detected onlyLogger
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 700675 Sample: D6EC737D10AFDAF38CAFEDE9FDE... Startdate: 10/09/2022 Architecture: WINDOWS Score: 100 104 www.hhiuew33.com 2->104 106 sun6-22.userapi.com 2->106 108 3 other IPs or domains 2->108 134 Snort IDS alert for network traffic 2->134 136 Multi AV Scanner detection for domain / URL 2->136 138 Malicious sample detected (through community Yara rule) 2->138 140 27 other signatures 2->140 12 D6EC737D10AFDAF38CAFEDE9FDE045DD3CE7BC72C6EE1.exe 10 2->12         started        15 WmiPrvSE.exe 2->15         started        17 WmiPrvSE.exe 2->17         started        signatures3 process4 file5 98 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->98 dropped 19 setup_installer.exe 23 12->19         started        23 rundll32.exe 15->23         started        process6 file7 76 C:\Users\user\AppData\...\setup_install.exe, PE32 19->76 dropped 78 C:\Users\user\...\Mon20f077c6d69ee9f8b.exe, PE32 19->78 dropped 80 C:\Users\user\...\Mon20e82b647a1ac403.exe, PE32 19->80 dropped 82 18 other files (13 malicious) 19->82 dropped 146 Multi AV Scanner detection for dropped file 19->146 25 setup_install.exe 1 19->25         started        signatures8 process9 dnsIp10 130 127.0.0.1 unknown unknown 25->130 132 hornygl.xyz 25->132 180 Multi AV Scanner detection for dropped file 25->180 182 Performs DNS queries to domains with low reputation 25->182 184 Adds a directory exclusion to Windows Defender 25->184 186 Disables Windows Defender (via service or powershell) 25->186 29 cmd.exe 25->29         started        31 cmd.exe 25->31         started        33 cmd.exe 25->33         started        35 16 other processes 25->35 signatures11 process12 signatures13 38 Mon20d92d25b1445bff7.exe 29->38         started        43 Mon20c51950859374.exe 31->43         started        45 Mon2053ecf0682a.exe 33->45         started        142 Adds a directory exclusion to Windows Defender 35->142 144 Disables Windows Defender (via service or powershell) 35->144 47 Mon203d61e947a5bb7ef.exe 3 35->47         started        49 Mon20f077c6d69ee9f8b.exe 35->49         started        51 Mon205ffbd65e17ad410.exe 35->51         started        53 11 other processes 35->53 process14 dnsIp15 110 212.193.30.115, 49768, 49817, 80 SPD-NETTR Russian Federation 38->110 112 vk.com 87.240.132.72, 443, 49831, 49832 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 38->112 118 21 other IPs or domains 38->118 84 C:\Users\...\JaGFOgpQIG4g6aVEjiUg4LRg.exe, PE32 38->84 dropped 86 C:\Users\user\AppData\Local\...\setup[1].exe, PE32 38->86 dropped 88 C:\Users\user\AppData\...\setup331[1].exe, PE32 38->88 dropped 96 15 other files (6 malicious) 38->96 dropped 148 Multi AV Scanner detection for dropped file 38->148 150 May check the online IP address of the machine 38->150 152 Creates HTML files with .exe extension (expired dropper behavior) 38->152 154 Disable Windows Defender real time protection (registry) 38->154 114 ip-api.com 208.95.112.1, 49727, 80 TUT-ASUS United States 43->114 116 www.hhiuew33.com 45.136.151.102, 49760, 49773, 49783 ENZUINC-US Latvia 43->116 90 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 43->90 dropped 156 Antivirus detection for dropped file 43->156 158 Machine Learning detection for dropped file 43->158 55 11111.exe 43->55         started        120 5 other IPs or domains 45->120 160 Query firmware table information (likely to detect VMs) 45->160 162 Tries to detect sandboxes and other dynamic analysis tools (window names) 45->162 170 3 other signatures 45->170 172 2 other signatures 47->172 164 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 49->164 59 Mon20f077c6d69ee9f8b.exe 49->59         started        166 Creates processes via WMI 51->166 61 Mon205ffbd65e17ad410.exe 51->61         started        122 8 other IPs or domains 53->122 92 C:\Users\user\...\Mon20492fe83a3518c3.tmp, PE32 53->92 dropped 94 C:\Users\user\AppData\Local\Temp\FlUR0.cpl, PE32 53->94 dropped 168 Obfuscated command line found 53->168 63 Mon20492fe83a3518c3.tmp 53->63         started        66 control.exe 53->66         started        68 explorer.exe 53->68 injected 70 WerFault.exe 53->70         started        file16 signatures17 process18 dnsIp19 124 192.168.2.1 unknown unknown 55->124 174 Multi AV Scanner detection for dropped file 55->174 176 Machine Learning detection for dropped file 55->176 178 Tries to harvest and steal browser information (history, passwords, etc) 55->178 126 ad-postback.biz 59->126 72 WerFault.exe 59->72         started        128 gp.gamebuy768.com 104.21.27.252, 443, 49743, 49750 CLOUDFLARENETUS United States 61->128 100 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 63->100 dropped 102 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 63->102 dropped 74 rundll32.exe 66->74         started        file20 signatures21 process22
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2022-09-07 23:40:00 UTC
File Type:
PE (Exe)
Extracted files:
712
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:fabookie family:onlylogger family:privateloader family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:8fc55a7ea41b0c5db2ca3c881e20966100c28a40 botnet:915 botnet:media23nps botnet:v3user1 aspackv2 backdoor discovery evasion infostealer loader main spyware stealer trojan
Behaviour
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger payload
Vidar Stealer
Detect Fabookie payload
Detects Smokeloader packer
Fabookie
Modifies Windows Defender Real-time Protection settings
OnlyLogger
PrivateLoader
Process spawned unexpected child process
Raccoon
RedLine
RedLine payload
SmokeLoader
Socelars
Socelars payload
Vidar
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
65.108.69.168:13293
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
159.69.246.184:13127
Unpacked files
SH256 hash:
3838a3056d2ffcadce93fc3308e8b05ab1a9ba80d62ab1e5795b3a93059ddda3
MD5 hash:
eef5aa795b8c7bd8cde26f28ae865417
SHA1 hash:
c3f7e948d95d11295cd1e6d6827664df6bea2fef
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
Detections:
win_smokeloader_a2 SmokeLoaderStage2
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
c40de0edd31a2829409504b546cba1ccf088aa8228ce0a342d7b18c53bb8d7fa
MD5 hash:
d9d89b446d1cd95790a6982f3e6e60c3
SHA1 hash:
f67182cedcce9a2c3fee8fc8ffcc88254f2a55d1
SH256 hash:
6aea19432073ea4697f182371a3a6dcecdb96e388bcb4b37008d8de924b2a172
MD5 hash:
93c8ad745913d0349369f1699468f5a5
SHA1 hash:
e23d1a7411e0410357ab5fe50660d1243c478519
SH256 hash:
04da62287ea722fb4afaf2555de5490fc0bf5117a821e411656673337b64db89
MD5 hash:
35a823185b3f4615796e145ac013fa26
SHA1 hash:
d7cb534d076a95dd0acf068a36de2056deab3fb8
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
56417a8f771cb2819b9a0dc18ecf26618cb5f3619c11a9374e2a8bd47e74cb09
MD5 hash:
0e86dedbfc16656b0ffa820276347710
SHA1 hash:
c033de6456dbf93d77a10ffb51724f5abf05352b
SH256 hash:
bdaed9486223e2becc934935671ea8e85a3c073f321d8890066b62e363aadab6
MD5 hash:
a7f979fbdd6a11090cec150dc311c0e4
SHA1 hash:
a825cec4b91a32b42ec1790da2f68af2c1508561
SH256 hash:
8ea2ceb773f656696b231c40667d0162ad5100c3ff8e0b3d76d46829f2de3484
MD5 hash:
7793d38b5b4e2e3d9e972f9c07bc1c7c
SHA1 hash:
83ff2d600765ea59a1c073874741d761e95d5332
SH256 hash:
a5d4c59893c336929fd3195493ea21e9c0c31e06f810063f12ce2e0946ecd6cf
MD5 hash:
b5f665de2c847540f0def34e9b0fdf53
SHA1 hash:
7a92586324137ed4fafb4ea7ac64434417e0bfcd
SH256 hash:
3d0b81e1daa85a50ee66803c689519c0cd941e7f2ab0917d5f037e4043150b0a
MD5 hash:
a3daed67b77024068231913a6eaa5b38
SHA1 hash:
6cc391ec6583f3d67a568930959f915ed0041ca5
SH256 hash:
9ee310eb117320d982266ee5544eadc7e3abeebab4db76cb92b643494ff55d76
MD5 hash:
8e78afba0d9d84834985ff1de47beec7
SHA1 hash:
6391337639fb99abaf56a469340bf1cb22b096b0
SH256 hash:
11631dc237cbb24278f15753487b830c831a1f6a6ff87b5f459fe67e420c0005
MD5 hash:
3d582902ca37d8d50c60184288f93870
SHA1 hash:
4d7189287a18c0a558dcc3b7f3a7a54dc7564075
SH256 hash:
669133ab9bcb3f73839fa828bd163e9ae96f41560f1c2e7377e9e2234da7c22b
MD5 hash:
082efbc195990f408078651b90202292
SHA1 hash:
3810c57644acd3defebf222ddb8575fb425207c7
SH256 hash:
f45daafd61371b1f080a92eea8e9c8bfc9b710f22c82d5a06a1b1bf271c646ad
MD5 hash:
7e32ef0bd7899fa465bb0bc866b21560
SHA1 hash:
115d09eeaff6bae686263d57b6069dd41f63c80c
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
Detections:
win_vidar_auto
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
cc9b4d53325715583e8f04493cb146267efe9160a858f74a8de3653c7c37b722
MD5 hash:
ea3c1dd511d0d6bff4786ece4af96571
SHA1 hash:
5ccd20ea99f5b92b8b6d03ee9561ec9444108f17
SH256 hash:
268aca393c547c2463b8c6cbc3e42f093a57b92ebd133e372d53b24e16ee1451
MD5 hash:
5a2f8b5557eeefb4bf19a017e05b8c87
SHA1 hash:
133796fbde81d78aae6151ae5d0abaf6a0c1832d
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
2feab366db98acb6c784e93d6f0eff1661a8c31bb0ef750c40e9dcbe68622467
MD5 hash:
ddaa21da962dac22015c701dcdcab4fd
SHA1 hash:
33c8d6e9869d73a792d7516832c6dd3e8f8efe11
SH256 hash:
95a0678ad8d50ef101d4d373fe2c42163ca6facf3bea9973d5bd4a1e7c9102ce
MD5 hash:
6da14f95d334d54c6d946cfacf2c9504
SHA1 hash:
bfa3677577315ee1a47d5d11c4c8e7fd0a320b96
SH256 hash:
b92846ad06965af73bb991eb660b0c4c6b53f08f4e4c893d3f4a374f3040af2d
MD5 hash:
ca3a4fa50329ae7137b4a866cf51ed1c
SHA1 hash:
3ee655ae451c277dd0967815b1ffd8ed850ac356
SH256 hash:
4fb593903c58926108e7e3ae817d16fbdb466393c77b0b24f89e24d207748643
MD5 hash:
df76fdef7cf2d574e736b0c71b910af7
SHA1 hash:
5a04f0bd66cfd8f5be31cd89858ebc2019e85ab3
SH256 hash:
d6ec737d10afdaf38cafede9fde045dd3ce7bc72c6ee13df33e018f0e7149893
MD5 hash:
b2014a589795baf565955d332d5878c2
SHA1 hash:
a2cbbd31204b050d20573394c6e953115c0e4238
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:pe_imphash
Rule name:RansomwareTest3
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:Raspberry_Robin_DLL_MAY_2022
Author:CD_R0M_
Description:Detects DLL dropped by Raspberry Robin.
Reference:https://redcanary.com/blog/raspberry-robin/
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments