MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e01749cfd587ae7029247ef900df2eb0e89e2fc594ca665d460a73bfa9564647. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 9


Intelligence 9 IOCs 2 YARA File information Comments 1

SHA256 hash: e01749cfd587ae7029247ef900df2eb0e89e2fc594ca665d460a73bfa9564647
SHA3-384 hash: 37d79580691711c3a5963e9dd6fa8946e87b6ef6b37930195a64260230912be5bf476e60eb4d9a126e6986bef9089260
SHA1 hash: a4941168e1269993b195b84fa272870c58bd6c10
MD5 hash: 438215ec552fef4a43a10c331d658c04
humanhash: yellow-snake-wolfram-low
File name:438215ec552fef4a43a10c331d658c04
Download: download sample
Signature CoinMiner
File size:131'072 bytes
First seen:2021-09-29 14:12:56 UTC
Last seen:2021-09-29 14:59:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2966ac92acef7bd43000e50be4b3a82c (3 x RaccoonStealer, 1 x CoinMiner, 1 x ArkeiStealer)
ssdeep 3072:NAtZ1A1rkry0hyv9qg5ziN5KrcPI1ZeWGhz0Tmx9z:NAtL6r59qWz7cPI18am3
Threatray 7'817 similar samples on MalwareBazaar
TLSH T1A2D3BD0175D0C3F2C59615707876C2A466FEB82D1F62A60B3B6856EF9FBC2D24A33316
File icon (PE):PE icon
dhash icon 4839b234e8c38890 (121 x RaccoonStealer, 54 x RedLineStealer, 51 x ArkeiStealer)
Reporter zbetcheckin
Tags:32 CoinMiner exe

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.56.146.60:18243 https://threatfox.abuse.ch/ioc/227509/
http://185.215.113.13/g4MbvE/index.php https://threatfox.abuse.ch/ioc/227531/

Intelligence


File Origin
# of uploads :
2
# of downloads :
222
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
438215ec552fef4a43a10c331d658c04
Verdict:
Suspicious activity
Analysis date:
2021-09-29 18:03:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Tofsee
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Tofsee
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 493806 Sample: bGs8XPlLKc Startdate: 30/09/2021 Architecture: WINDOWS Score: 100 77 microsoft-com.mail.protection.outlook.com 52.101.24.0, 25, 49827 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->77 79 defeatwax.ru 193.56.146.188, 443, 49828, 49863 LVLT-10753US unknown 2->79 81 4 other IPs or domains 2->81 121 System process connects to network (likely due to code injection or exploit) 2->121 123 Multi AV Scanner detection for submitted file 2->123 125 Yara detected SmokeLoader 2->125 127 13 other signatures 2->127 11 bGs8XPlLKc.exe 2->11         started        14 fsgcjca 2->14         started        16 svchost.exe 2->16         started        19 4 other processes 2->19 signatures3 process4 dnsIp5 137 Detected unpacking (changes PE section rights) 11->137 21 bGs8XPlLKc.exe 11->21         started        139 Multi AV Scanner detection for dropped file 14->139 24 fsgcjca 14->24         started        75 127.0.0.1 unknown unknown 16->75 signatures6 process7 signatures8 129 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 21->129 131 Maps a DLL or memory area into another process 21->131 133 Checks if the current machine is a virtual machine (disk enumeration) 21->133 135 Creates a thread in another existing process (thread injection) 21->135 26 explorer.exe 8 21->26 injected process9 dnsIp10 83 193.56.146.41, 49798, 9080 LVLT-10753US unknown 26->83 85 216.128.137.31, 80 AS-CHOOPAUS United States 26->85 87 2 other IPs or domains 26->87 67 C:\Users\user\AppData\Roaming\fsgcjca, PE32 26->67 dropped 69 C:\Users\user\AppData\Local\Temp\458.exe, PE32 26->69 dropped 71 C:\Users\user\AppData\Local\Temp\2F63.exe, PE32 26->71 dropped 73 2 other malicious files 26->73 dropped 157 System process connects to network (likely due to code injection or exploit) 26->157 159 Benign windows process drops PE files 26->159 161 Deletes itself after installation 26->161 163 Hides that the sample has been downloaded from the Internet (zone.identifier) 26->163 31 2F63.exe 15 6 26->31         started        36 458.exe 26->36         started        38 4F9E.exe 2 26->38         started        40 1948.exe 2 26->40         started        file11 signatures12 process13 dnsIp14 95 ipapi.co 172.67.69.226, 443, 49786, 49819 CLOUDFLARENETUS United States 31->95 61 C:\Users\user\AppData\Roaming\2F63.exe, PE32 31->61 dropped 99 Antivirus detection for dropped file 31->99 101 Multi AV Scanner detection for dropped file 31->101 103 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->103 119 2 other signatures 31->119 42 2F63.exe 31->42         started        105 Detected unpacking (changes PE section rights) 36->105 107 Machine Learning detection for dropped file 36->107 109 Contains functionality to inject code into remote processes 36->109 46 458.exe 36->46         started        97 192.168.2.1 unknown unknown 38->97 63 C:\Users\user\AppData\Local\...\dbqcwsdt.exe, PE32 38->63 dropped 111 Detected unpacking (overwrites its own PE header) 38->111 113 Uses netsh to modify the Windows network and firewall settings 38->113 115 Modifies the windows firewall 38->115 48 cmd.exe 38->48         started        51 cmd.exe 38->51         started        117 Injects a PE file into a foreign processes 40->117 53 1948.exe 2 40->53         started        55 conhost.exe 40->55         started        file15 signatures16 process17 dnsIp18 89 ipapi.co 42->89 91 90.156.5.0.in-addr.arpa 42->91 141 Antivirus detection for dropped file 42->141 143 Multi AV Scanner detection for dropped file 42->143 145 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->145 155 5 other signatures 42->155 147 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 46->147 149 Maps a DLL or memory area into another process 46->149 151 Checks if the current machine is a virtual machine (disk enumeration) 46->151 153 Creates a thread in another existing process (thread injection) 46->153 65 C:\Windows\SysWOW64\...\dbqcwsdt.exe (copy), PE32 48->65 dropped 57 conhost.exe 48->57         started        59 conhost.exe 51->59         started        93 188.72.208.174, 38430, 49824 WEBZILLANL Netherlands 53->93 file19 signatures20 process21
Threat name:
Win32.Trojan.MintTitirez
Status:
Malicious
First seen:
2021-09-29 13:15:21 UTC
AV detection:
18 of 27 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gozi_rm3 family:raccoon family:redline family:smokeloader family:tofsee family:xmrig botnet:5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4 botnet:5k superstar botnet:777777 backdoor banker discovery evasion infostealer miner persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Enumerates connected drives
Looks up external IP address via web service
Deletes itself
Drops startup file
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Blocklisted process makes network request
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
Nirsoft
XMRig Miner Payload
Gozi RM3
Modifies Windows Defender Real-time Protection settings
Raccoon
RedLine
RedLine Payload
SmokeLoader
Tofsee
Turns off Windows Defender SpyNet reporting
Windows security bypass
xmrig
Malware Config
C2 Extraction:
http://fiskahlilian16.top/
http://paishancho17.top/
http://ydiannetter18.top/
http://azarehanelle19.top/
http://quericeriant20.top/
92.246.89.6:38437
193.56.146.60:18243
narlelalik.xyz:12509
Unpacked files
SH256 hash:
592b089027938156e18387e4402b965a5f1ffc25e96d7efc3aa9331254587bdd
MD5 hash:
2dbb1eb8c40c88994738a736ad55c79b
SHA1 hash:
88e2fc9242606c7dfcd68d5da8c6d457837157a3
SH256 hash:
e01749cfd587ae7029247ef900df2eb0e89e2fc594ca665d460a73bfa9564647
MD5 hash:
438215ec552fef4a43a10c331d658c04
SHA1 hash:
a4941168e1269993b195b84fa272870c58bd6c10
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe e01749cfd587ae7029247ef900df2eb0e89e2fc594ca665d460a73bfa9564647

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-29 14:12:57 UTC

url : hxxp://privacy-toolz-for-you-502.top/downloads/toolspab2.exe