MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dff8b47d7290a0502a4c5ee183b85ea28a9ab501d93b7c1a11c9592e544d1fe7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: dff8b47d7290a0502a4c5ee183b85ea28a9ab501d93b7c1a11c9592e544d1fe7
SHA3-384 hash: dbc24140d16ae4452a8ea36eadc0bf9ec86305f96887618adc55b0cc6f904ec18368956730bade671b94c82725973d7c
SHA1 hash: 5fe7758e32f00cae07da6ad9b64db7f09074b9fb
MD5 hash: 10eb1924b6397b13b7e7b4a670c6fa59
humanhash: yankee-california-cardinal-foxtrot
File name:10eb1924b6397b13b7e7b4a670c6fa59.exe
Download: download sample
Signature CoinMiner
File size:667'648 bytes
First seen:2021-12-14 16:49:25 UTC
Last seen:2021-12-14 18:45:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9a7d8deb9f5b4ee77055264204973361 (7 x RedLineStealer, 2 x ArkeiStealer, 1 x CoinMiner)
ssdeep 12288:OgS4kYP5COrh+Q+eUCOthn/Q0OwJ8/Q1NKhlmHhkcd7w:OLYPkOrh+Q+JCM9Kvoahl+1e
Threatray 3'752 similar samples on MalwareBazaar
TLSH T128E402D274EED072E5A72A319420C3E55D37B983DE34519F36342BAE6FB23E01A21716
File icon (PE):PE icon
dhash icon 327e7c7f727e6e66 (1 x CoinMiner, 1 x RaccoonStealer, 1 x RedLineStealer)
Reporter abuse_ch
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
10eb1924b6397b13b7e7b4a670c6fa59.exe
Verdict:
Malicious activity
Analysis date:
2021-12-14 17:04:47 UTC
Tags:
trojan stealer vidar loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Delayed writing of the file
Query of malicious DNS domain
Sending a TCP request to an infection source
Stealing user critical data
Sending an HTTP GET request to an infection source
Forced shutdown of a browser
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected Vidar
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-12-14 00:42:10 UTC
File Type:
PE (Exe)
Extracted files:
43
AV detection:
34 of 45 (75.56%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar family:xmrig botnet:1067 discovery miner spyware stealer suricata
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
NTFS ADS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
XMRig Miner Payload
Vidar
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
xmrig
Malware Config
C2 Extraction:
https://mstdn.social/@sergeev43
https://koyu.space/@sergeev45
Unpacked files
SH256 hash:
d9271b5454d70d4bf643d341bf36b564ba7cce9e2edf487fca99c8b3a71f1df8
MD5 hash:
c3811426be46a7056b3716ab94901f9c
SHA1 hash:
f207caa4c279d1348d3c785cf3055a80d0cd6ecf
SH256 hash:
dff8b47d7290a0502a4c5ee183b85ea28a9ab501d93b7c1a11c9592e544d1fe7
MD5 hash:
10eb1924b6397b13b7e7b4a670c6fa59
SHA1 hash:
5fe7758e32f00cae07da6ad9b64db7f09074b9fb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe dff8b47d7290a0502a4c5ee183b85ea28a9ab501d93b7c1a11c9592e544d1fe7

(this sample)

  
Delivery method
Distributed via web download

Comments