MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e3135f01a3b76a91bb1082fd5b53259fe2d59eb6ab550fcc6fa6c866412920f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 34 File information Comments

SHA256 hash: e3135f01a3b76a91bb1082fd5b53259fe2d59eb6ab550fcc6fa6c866412920f8
SHA3-384 hash: 1f45c4039dd67218f001b2fae98c454ad984ad3c1f4873791d8b1e2d594ccfe5697b8ec85d2ef00eea365707c57a04cc
SHA1 hash: 29c1b1e24a22513e91af7bb3302991a4ec3c36f8
MD5 hash: 5dd2b1966b6379a9abcbfe75b750e6e7
humanhash: failed-iowa-carpet-sweet
File name:E3135F01A3B76A91BB1082FD5B53259FE2D59EB6AB550.exe
Download: download sample
Signature CoinMiner
File size:2'847'490 bytes
First seen:2022-08-21 14:15:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBiPkZVi7iKiF8cUvFyP0/hX4Pl4C+AVMo88hll5PtrKcJ0U8EwJ84vLRaBtIlD:xsri7ixZUvFyP0ZCl+AVMoxDjPtr7+e4
TLSH T141D533517FC6C0FBE1126039DD492FF9F2FAE3981A2448D33F809D0B5F3A5598226999
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:CoinMiner exe


Avatar
abuse_ch
CoinMiner C2:
http://87.251.77.253/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://87.251.77.253/ https://threatfox.abuse.ch/ioc/844497/

Intelligence


File Origin
# of uploads :
1
# of downloads :
410
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
E3135F01A3B76A91BB1082FD5B53259FE2D59EB6AB550.exe
Verdict:
No threats detected
Analysis date:
2022-08-21 14:17:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Moving a file to the %temp% subdirectory
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a file
Creating a window
Using the Windows Management Instrumentation requests
Sending an HTTP GET request
Launching a process
Creating a process with a hidden window
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nitol, PrivateLoader, Raccoon Stealer v2
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Nitol
Yara detected PrivateLoader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Tofsee
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 687587 Sample: E3135F01A3B76A91BB1082FD5B5... Startdate: 21/08/2022 Architecture: WINDOWS Score: 100 137 google.vrthcobj.com 2->137 139 ipinfo.io 2->139 141 cdn.discordapp.com 2->141 169 Snort IDS alert for network traffic 2->169 171 Multi AV Scanner detection for domain / URL 2->171 173 Malicious sample detected (through community Yara rule) 2->173 177 24 other signatures 2->177 11 E3135F01A3B76A91BB1082FD5B53259FE2D59EB6AB550.exe 16 2->11         started        14 rundll32.exe 2->14         started        16 svchost.exe 2->16         started        19 5 other processes 2->19 signatures3 175 System process connects to network (likely due to code injection or exploit) 137->175 process4 file5 115 C:\Users\user\AppData\Local\...\sonia_8.txt, PE32 11->115 dropped 117 C:\Users\user\AppData\Local\...\sonia_7.txt, PE32 11->117 dropped 119 C:\Users\user\AppData\Local\...\sonia_6.txt, PE32 11->119 dropped 121 11 other files (6 malicious) 11->121 dropped 21 setup_install.exe 1 11->21         started        26 rundll32.exe 14->26         started        149 System process connects to network (likely due to code injection or exploit) 16->149 28 WerFault.exe 16->28         started        30 WerFault.exe 16->30         started        151 Changes security center settings (notifications, updates, antivirus, firewall) 19->151 signatures6 process7 dnsIp8 143 sokiran.xyz 21->143 145 google.vrthcobj.com 21->145 147 127.0.0.1 unknown unknown 21->147 99 C:\Users\user~1\...\sonia_8.exe (copy), PE32 21->99 dropped 101 C:\Users\user~1\...\sonia_7.exe (copy), PE32 21->101 dropped 103 C:\Users\user~1\...\sonia_6.exe (copy), PE32 21->103 dropped 105 5 other malicious files 21->105 dropped 189 Performs DNS queries to domains with low reputation 21->189 32 cmd.exe 1 21->32         started        34 cmd.exe 1 21->34         started        36 cmd.exe 1 21->36         started        46 8 other processes 21->46 191 Writes to foreign memory regions 26->191 193 Allocates memory in foreign processes 26->193 195 Creates a thread in another existing process (thread injection) 26->195 38 svchost.exe 26->38 injected 40 svchost.exe 26->40 injected 42 svchost.exe 26->42 injected 44 svchost.exe 26->44 injected file9 signatures10 process11 process12 48 sonia_6.exe 32->48         started        53 sonia_5.exe 34->53         started        55 sonia_1.exe 2 36->55         started        57 svchost.exe 38->57         started        59 sonia_2.exe 46->59         started        61 sonia_8.exe 46->61         started        63 sonia_3.exe 12 46->63         started        65 2 other processes 46->65 dnsIp13 123 212.193.30.115, 49771, 49844, 80 SPD-NETTR Russian Federation 48->123 133 9 other IPs or domains 48->133 89 C:\Users\...\zXrnoAs_04huDRD8FhAa6dwX.exe, PE32 48->89 dropped 91 C:\Users\...\nsuLKDSRzJ7uGiuaW0VJ1UKl.exe, PE32 48->91 dropped 93 C:\Users\...\ncmzuCW6zx5k9ADgCoP1gavp.exe, PE32 48->93 dropped 97 10 other malicious files 48->97 dropped 153 Drops PE files to the document folder of the user 48->153 155 May check the online IP address of the machine 48->155 157 Disable Windows Defender real time protection (registry) 48->157 67 KXQKpUGsiBwMoCzXZ2e86Jx9.exe 48->67         started        70 bDR_9Qz1VbyUNa3ses_dDGMB.exe 48->70         started        73 4J2eL0ahjC41WJjw6xt0wRFN.exe 48->73         started        85 2 other processes 48->85 125 videoconvert-download38.xyz 53->125 127 iplogger.org 148.251.234.83, 443, 49893, 49902 HETZNER-ASDE Germany 53->127 159 Performs DNS queries to domains with low reputation 53->159 161 Creates processes via WMI 55->161 75 sonia_1.exe 5 55->75         started        129 google.vrthcobj.com 57->129 163 Query firmware table information (likely to detect VMs) 57->163 95 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 59->95 dropped 165 DLL reload attack detected 59->165 77 explorer.exe 59->77 injected 167 Injects a PE file into a foreign processes 61->167 79 sonia_8.exe 61->79         started        81 sonia_8.exe 61->81         started        131 olegf9844.tumblr.com 74.114.154.18, 443, 49757 AUTOMATTICUS Canada 63->131 83 WerFault.exe 63->83         started        135 2 other IPs or domains 65->135 file14 signatures15 process16 file17 179 Writes to foreign memory regions 67->179 181 Allocates memory in foreign processes 67->181 183 Injects a PE file into a foreign processes 67->183 107 C:\Users\user\AppData\Local\...\bzxvzdvw.exe, PE32 70->107 dropped 185 Detected unpacking (changes PE section rights) 70->185 187 Detected unpacking (overwrites its own PE header) 70->187 109 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 75->109 dropped 111 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 75->111 dropped 113 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 75->113 dropped 87 conhost.exe 75->87         started        signatures18 process19
Threat name:
Win32.Downloader.ShortLoader
Status:
Malicious
First seen:
2022-08-20 23:31:00 UTC
File Type:
PE (Exe)
Extracted files:
213
AV detection:
22 of 26 (84.62%)
Threat level:
  3/5
Verdict:
malicious
Label(s):
masslogger
Result
Malware family:
Score:
  10/10
Tags:
family:privateloader family:redline family:tofsee family:vidar family:xmrig botnet:933 botnet:ani botnet:cana01 botnet:firefire botnet:logsdiller cloud (tg: @mr_golds) botnet:nam6.1 botnet:ruzki6 aspackv2 evasion infostealer loader miner persistence stealer trojan
Behaviour
Checks SCSI registry key(s)
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Launches sc.exe
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Uses the VBS compiler for execution
ASPack v2.12-2.42
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Vidar Stealer
XMRig Miner payload
Modifies Windows Defender Real-time Protection settings
PrivateLoader
Process spawned unexpected child process
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Tofsee
Vidar
xmrig
Malware Config
C2 Extraction:
176.111.174.254:56328
https://olegf9844.tumblr.com/
akedauiver.xyz:80
193.233.193.14:8163
185.200.242.47:44993
103.89.90.61:34589
svartalfheim.top
jotunheim.name
176.113.115.146:9582
Unpacked files
SH256 hash:
09e4e7eaa8f614888e2539539c3ec2309f6e699a4c73989d3402b59644267e3b
MD5 hash:
c4b138a1dd9ff17538ef0d91a5906145
SHA1 hash:
a3560902e8ac5b47dc0e2c3a505850225ca002f4
SH256 hash:
5a580d590efe50a4072580e030ff03a2bdc9cb5bb6424c8167e6cdc106662d80
MD5 hash:
9b8888a96bb81b13d824f42811dd73e4
SHA1 hash:
7a15193d26b0e2fb5f1894fee476aeb6987b2d5f
SH256 hash:
65e857b77577451c4894c0e9b8f3acc64906472b9bf980d76cb209b5b17a6e04
MD5 hash:
385b2e02d14579a16a0f73d48d266191
SHA1 hash:
248abbcee3367b48a98002560f521472b78d51e4
SH256 hash:
140687c607a8adee38572a2b5b5b12dcf4c5eecfa5d2428d34f09b627a71e6bd
MD5 hash:
0b1df2ab5308c2e8927f9adeac08c657
SHA1 hash:
10212be3c4b01016525039786e3f28909be1b96a
SH256 hash:
42ca6e15a792e7d81a2f0211392fcf29623f1dfda3159325b9ce8e2cef6e640b
MD5 hash:
dcb89de182013699d3a559b9d85053b4
SHA1 hash:
b4433c6aa54a7d3ce4956ca1f49378857da19ccb
SH256 hash:
0e5b7261da6bf316e2b84530027356e038e78b25c2d86a108db65bf348059763
MD5 hash:
b6acd0bab75d614405a3ec3e9750cc19
SHA1 hash:
aafe902736ec80d904165853f077d3520ebd2876
SH256 hash:
9432641ffc06c783ff8a7cd55f33948730f7e00bb2782564f580ba104c817ee2
MD5 hash:
975d1be4341522d562c0a6effde08e2f
SHA1 hash:
8aff3e0abc92a9f01e9aefd1b1fc421bfd82e4f9
SH256 hash:
ea42603dea1b74bfff94b23fb910d6f115ba53fb85fcf2ad02a5d779d42d0a7b
MD5 hash:
67c2ade011b8e04054b7841f96f7377f
SHA1 hash:
75d182076b791b3318ea8427ce3ec927e4b08cd9
Detections:
win_vidar_auto
SH256 hash:
a6917d9e96450b6c87417921a28a6ed972cfa26480fef3d23f25518af25c154d
MD5 hash:
36e9deef2639a8c241f2f1b7d118be82
SHA1 hash:
d17e4ea9232adecbec0d248142ab4ade319253f9
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
58bd9f39b9b0cc9f4b527932fda2cf29720701db005899e70b5d9d2c215c180d
MD5 hash:
98c6725dae57c0c01e26e2b93f049b70
SHA1 hash:
b584d62ddc78c7db7b01590588f29e9bd383e784
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
93c62870650c0844a9f8bf16f79b783b39fbbe1d4cddbf84dfb6d7370fe09f47
MD5 hash:
db4eb94672e3aa705923f41fdfddfab6
SHA1 hash:
739fa6558cf292c302794a5f7dc15fc4d82d768c
SH256 hash:
bfd3a440f907482cbb9727416f83393fb8c1266f1c797e5a8f9e3fd9a45118fc
MD5 hash:
5a22f7877d6471eb260cea5b418ade76
SHA1 hash:
6a6cc932d37258554c31f579eab38b37731e7cfa
SH256 hash:
53379b36716f384e530dae9ec883c459d0c12f0260116614a0482ded7d9b5ba9
MD5 hash:
ec149486075982428b9d394c1a5375fd
SHA1 hash:
63c94ed4abc8aff9001293045bc4d8ce549a47b8
Detections:
win_privateloader_a0 win_privateloader_auto win_privateloader_w0
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
9717f526bf9c56a5d06ccd0fb71eef0579d26b7100d01665b76d8fdd211b48bd
MD5 hash:
dbc3e1e93fe6f9e1806448cd19e703f7
SHA1 hash:
061119a118197ca93f69045abd657aa3627fc2c5
SH256 hash:
a8632abfba80d4104293ebce8f2cf5a042afe6bd5dfae8c46f7fb54db403cea4
MD5 hash:
5db5c850bb7f046dd04fb052243fd902
SHA1 hash:
2d42677ca60ca21dbe72015f9c72b01fc074aeee
SH256 hash:
e3135f01a3b76a91bb1082fd5b53259fe2d59eb6ab550fcc6fa6c866412920f8
MD5 hash:
5dd2b1966b6379a9abcbfe75b750e6e7
SHA1 hash:
29c1b1e24a22513e91af7bb3302991a4ec3c36f8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CoinMiner_Strings
Author:Florian Roth
Description:Detects mining pool protocol string in Executable
Reference:https://minergate.com/faq/what-pool-address
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Chebka
Author:ditekSHen
Description:Detects Chebka
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Tofsee
Author:ditekSHen
Description:Detects Tofsee
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:MINER_monero_mining_detection
Author:Trellix ATR team
Description:Monero mining software
Rule name:pe_imphash
Rule name:PUA_Crypto_Mining_CommandLine_Indicators_Oct21
Author:Florian Roth
Description:Detects command line parameters often used by crypto mining software
Reference:https://www.poolwatch.io/coin/monero
Rule name:RaccoonV2
Author:@_FirehaK <yara@firehak.com>
Description:This rule detects Raccoon Stealer version 2.0 (called Recordbreaker before attribution). It has been spotted spreading through fake software cracks and keygens as far back as April 2022.
Reference:https://www.zerofox.com/blog/brief-raccoon-stealer-version-2-0/
Rule name:Redline32
Author:Muffin
Description:This rule detects Redline Stealer
Rule name:RedLine_a
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:RedOctoberPluginCollectInfo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_recordbreaker_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.recordbreaker.
Rule name:win_tofsee_w0
Author:akrasuski1
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.
Rule name:XMRIG_Monero_Miner
Author:Florian Roth
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases
Rule name:XMRIG_Monero_Miner_RID2DC1
Author:Florian Roth
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments