MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e6ab4c27e330156ac4034d79775360a531b2d5b18f76527efeb93cf97a1d6fde. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments 1

SHA256 hash: e6ab4c27e330156ac4034d79775360a531b2d5b18f76527efeb93cf97a1d6fde
SHA3-384 hash: 8031066bf34a0298d8dc53b8062b2a308ab2cf84390a3206a6dc67ab9fb96b567bc711029df8abc89edc2127979b6ea9
SHA1 hash: d7e5c0ed7ae06d5847a2338fa7990c078fa29cca
MD5 hash: 47231437c5f27bee7a68711b014798e9
humanhash: mike-batman-delta-glucose
File name:47231437c5f27bee7a68711b014798e9
Download: download sample
Signature Mirai
File size:10'194'432 bytes
First seen:2022-08-24 20:20:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a56f115ee5ef2625bd949acaeec66b76 (53 x Stealc, 47 x PureHVNC, 28 x RedLineStealer)
ssdeep 196608:pYP5KbPojn8Em4cVuXRD03ndBdj09Gs8/j6iz6GQM8aeDknvWUxZi:Ysg4Z4J+jC9/87FNtScY
TLSH T176A6C0FB36E1259FC22AD0F7C110B43F875FB4769B16B967A4723264D623970B928B10
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter zbetcheckin
Tags:exe mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
430
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
47231437c5f27bee7a68711b014798e9
Verdict:
No threats detected
Analysis date:
2022-08-24 20:34:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Using the Windows Management Instrumentation requests
Launching a process
Creating a file
DNS request
Connecting to a cryptocurrency mining pool
Sending a custom TCP request
Sending an HTTP POST request
Creating a service
Launching a service
Loading a system driver
Creating a file in the Windows subdirectories
Enabling autorun for a service
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Result
Threat name:
Crypto Miner, Xmrig
Detection:
malicious
Classification:
spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Yara detected Crypto Miner
Yara detected RUNPE
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 689803 Sample: C9EJ8yIaFy Startdate: 24/08/2022 Architecture: WINDOWS Score: 100 46 Snort IDS alert for network traffic 2->46 48 Multi AV Scanner detection for domain / URL 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 11 other signatures 2->52 7 C9EJ8yIaFy.exe 8 2->7         started        11 svchost.exe 2->11         started        13 svchost.exe 1 1 2->13         started        16 6 other processes 2->16 process3 dnsIp4 36 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 7->36 dropped 38 C:\Users\user\AppData\...\C9EJ8yIaFy.exe.log, ASCII 7->38 dropped 62 Detected unpacking (changes PE section rights) 7->62 64 Query firmware table information (likely to detect VMs) 7->64 66 Tries to detect sandboxes and other dynamic analysis tools (window names) 7->66 72 7 other signatures 7->72 18 cmd.exe 1 7->18         started        21 svchost.exe 7->21         started        68 Changes security center settings (notifications, updates, antivirus, firewall) 11->68 24 MpCmdRun.exe 1 11->24         started        44 127.0.0.1 unknown unknown 13->44 70 System process connects to network (likely due to code injection or exploit) 13->70 file5 signatures6 process7 dnsIp8 54 Uses powercfg.exe to modify the power settings 18->54 56 Modifies power options to not sleep / hibernate 18->56 26 conhost.exe 18->26         started        28 powercfg.exe 1 18->28         started        30 powercfg.exe 1 18->30         started        34 2 other processes 18->34 40 xmr.2miners.com 51.89.96.41, 2222, 49733 OVHFR France 21->40 42 cothdesigns.com 223.165.6.91, 443, 49734, 49745 LINTASBUANA-AS-IDPTBUANALINTASMEDIAID Indonesia 21->42 58 Query firmware table information (likely to detect VMs) 21->58 32 conhost.exe 24->32         started        signatures9 60 Detected Stratum mining protocol 40->60 process10
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2022-08-24 20:21:21 UTC
File Type:
PE+ (Exe)
Extracted files:
3
AV detection:
20 of 41 (48.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig evasion miner trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Checks BIOS information in registry
Checks computer location settings
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner payload
xmrig
Unpacked files
SH256 hash:
e6ab4c27e330156ac4034d79775360a531b2d5b18f76527efeb93cf97a1d6fde
MD5 hash:
47231437c5f27bee7a68711b014798e9
SHA1 hash:
d7e5c0ed7ae06d5847a2338fa7990c078fa29cca
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

Executable exe e6ab4c27e330156ac4034d79775360a531b2d5b18f76527efeb93cf97a1d6fde

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-08-24 20:20:13 UTC

url : hxxp://purposedesigns.net:443/wniavctm.msi