MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e5ddc31d2c92d19cb412602f4d9ad66144d509f66bbb770f610dab1ecbdd05c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: e5ddc31d2c92d19cb412602f4d9ad66144d509f66bbb770f610dab1ecbdd05c9
SHA3-384 hash: a4895f8b9327f8a544f035993520f0568ec9639f5c5dc31bd08432516b2086326cfb20a49247bae5313ae370245dbfb9
SHA1 hash: 99b298a20c039b5310751caf6804c04a266286dd
MD5 hash: ed26d7818becb7d1d6f2c817341611aa
humanhash: beryllium-michigan-single-alaska
File name:file.exe
Download: download sample
Signature CoinMiner
File size:4'039'413 bytes
First seen:2023-03-30 06:34:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c1f9ea6d51ba4934aeaee8b1f7d283d7 (2 x CoinMiner, 1 x FatalRAT, 1 x Blackmoon)
ssdeep 98304:3nyEcfLLDXXlvsSF9oBi0VSz2XIlehHUFjXW6EXc2QtlYs:3yEcfLLDHlvPF9oBiNzKSehHUFTW6EXE
TLSH T1581633C1FB35604AFC07D6391086678BF73AD91CC183909B3ED55B364C4DEAD8AAA6D0
TrID 45.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.3% (.EXE) OS/2 Executable (generic) (2029/13)
18.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.0% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 8270d8dccce8f092 (1 x CoinMiner)
Reporter abuse_ch
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
292
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file.exe
Verdict:
No threats detected
Analysis date:
2023-03-30 06:36:28 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Enabling the 'hidden' option for files in the %temp% directory
Creating a process from a recently created file
Launching a process
Creating a file
Sending a custom TCP request
DNS request
Creating a file in the Windows subdirectories
Forced system process termination
Query of malicious DNS domain
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates files in the system32 config directory
Detected Stratum mining protocol
Detected unpacking (overwrites its own PE header)
Found hidden mapped module (file has been removed from disk)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PowerShell case anomaly found
Powershell drops PE file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Snort IDS alert for network traffic
Suspicious powershell command line found
Uses powercfg.exe to modify the power settings
Very long command line found
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 837780 Sample: file.exe Startdate: 30/03/2023 Architecture: WINDOWS Score: 100 88 Snort IDS alert for network traffic 2->88 90 Malicious sample detected (through community Yara rule) 2->90 92 Antivirus detection for URL or domain 2->92 94 6 other signatures 2->94 10 file.exe 8 2->10         started        13 mshta.exe 2 2->13         started        16 cmd.exe 2->16         started        18 2 other processes 2->18 process3 file4 74 C:\Users\user\AppData\Local\...\Installer.exe, PE32+ 10->74 dropped 20 Installer.exe 1 3 10->20         started        24 cmd.exe 1 10->24         started        26 cmd.exe 1 10->26         started        138 Suspicious powershell command line found 13->138 28 powershell.exe 13->28         started        140 Modifies power options to not sleep / hibernate 16->140 30 conhost.exe 16->30         started        32 powercfg.exe 16->32         started        38 3 other processes 16->38 142 Creates files in the system32 config directory 18->142 34 conhost.exe 18->34         started        36 WMIC.exe 18->36         started        signatures5 process6 file7 66 C:\Users\user\AppData\Local\...\install.exe, PE32+ 20->66 dropped 96 Multi AV Scanner detection for dropped file 20->96 40 install.exe 2 20->40         started        98 Uses powercfg.exe to modify the power settings 24->98 100 Modifies power options to not sleep / hibernate 24->100 43 conhost.exe 24->43         started        45 conhost.exe 26->45         started        68 C:\Windows\Temp\dqjjvhqz.tmp, PE32+ 28->68 dropped 70 C:\Windows\System32\config\...\WR64.sys, PE32+ 28->70 dropped 102 Very long command line found 28->102 104 Creates files in the system32 config directory 28->104 106 Writes to foreign memory regions 28->106 108 3 other signatures 28->108 47 dwm.exe 28->47         started        50 conhost.exe 28->50         started        signatures8 process9 dnsIp10 124 Multi AV Scanner detection for dropped file 40->124 126 Detected unpacking (overwrites its own PE header) 40->126 128 Machine Learning detection for dropped file 40->128 136 4 other signatures 40->136 52 rundll32.exe 2 40->52         started        57 powershell.exe 8 40->57         started        130 May check the online IP address of the machine 43->130 84 179.43.154.176, 49700, 49702, 7000 PLI-ASCH Panama 47->84 86 snippet.host 192.144.37.43, 443, 49701 SERVERUM-ASRU Russian Federation 47->86 132 Query firmware table information (likely to detect VMs) 47->132 signatures11 134 Detected Stratum mining protocol 84->134 process12 dnsIp13 76 192.168.2.1 unknown unknown 52->76 72 C:\Users\user\AppData\Local\...\evb4EE5.tmp, PE32+ 52->72 dropped 110 Writes to foreign memory regions 52->110 112 Allocates memory in foreign processes 52->112 114 Hides threads from debuggers 52->114 122 2 other signatures 52->122 59 conhost.exe 15 30 52->59         started        116 Very long command line found 57->116 118 Found hidden mapped module (file has been removed from disk) 57->118 120 Powershell drops PE file 57->120 62 conhost.exe 57->62         started        file14 signatures15 process16 dnsIp17 78 eth0.me 5.132.162.27, 443, 49699 INTERNEX-ASAT Austria 59->78 80 iplogger.com 148.251.234.93, 443, 49698 HETZNER-ASDE Germany 59->80 82 gist.githubusercontent.com 185.199.108.133, 443, 49696 FASTLYUS Netherlands 59->82 64 cmd.exe 59->64         started        process18
Threat name:
Win64.Trojan.Barys
Status:
Malicious
First seen:
2023-03-30 06:35:25 UTC
File Type:
PE+ (Exe)
Extracted files:
111
AV detection:
8 of 37 (21.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Checks computer location settings
Deletes itself
Executes dropped EXE
Loads dropped DLL
UPX packed file
Unpacked files
SH256 hash:
e256ad75eab5c64a428538604ae0ba5d9d46b64f04d84ff1b436aa7e4b2abe1d
MD5 hash:
3c3b3e44c44cf717eb6bc2a6c3fa6f0c
SHA1 hash:
ba2f91e9b2fb734f96fe74c1391b6dfdb542da50
SH256 hash:
e5ddc31d2c92d19cb412602f4d9ad66144d509f66bbb770f610dab1ecbdd05c9
MD5 hash:
ed26d7818becb7d1d6f2c817341611aa
SHA1 hash:
99b298a20c039b5310751caf6804c04a266286dd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Truncated_win10_x64_NativeSysCall
Author:SBousseaden
Description:hunt of at least 3 occurences of truncated win10 x64 NativeSyscall

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments