MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e803ddc18558dca04c7705867278ab91678921e0825e2f54070bba456702ddd1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 4 File information Comments

SHA256 hash: e803ddc18558dca04c7705867278ab91678921e0825e2f54070bba456702ddd1
SHA3-384 hash: 01b3315e5ca633fd3591380191c4dcdba47387371f303be462a65cc749d00f982deec4f7242757a3b2c7951cdc7092a8
SHA1 hash: e02adc47cac53b317bdb080863d4195a2e6c1754
MD5 hash: 08d5bb6406c16b548273757aef5b9e52
humanhash: green-mexico-mexico-nevada
File name:08d5bb6406c16b548273757aef5b9e52.exe
Download: download sample
Signature CoinMiner
File size:2'653'372 bytes
First seen:2022-08-06 21:45:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1e33718404ffbe0d91b536c10bf053f8 (80 x RedLineStealer, 7 x RecordBreaker, 4 x N-W0rm)
ssdeep 24576:A5J8tHPqrxw07YBYg3yhvBgM5jdrvEk627ApiZqIgcNcWSCLoi6rdl3RuQ55313b:AAtvixwLDaAcbgicWSCordl3x
TLSH T141C51A135A8B0E79DDD23BB461CB633AA734FD30CA3A9B7BB608C43559532C56C1A742
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:CoinMiner exe


Avatar
abuse_ch
CoinMiner C2:
179.43.187.8:22378

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
179.43.187.8:22378 https://threatfox.abuse.ch/ioc/841712/

Intelligence


File Origin
# of uploads :
1
# of downloads :
567
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
08d5bb6406c16b548273757aef5b9e52.exe
Verdict:
Malicious activity
Analysis date:
2022-08-06 21:46:43 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug arkei overlay spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-08-04 13:44:24 UTC
File Type:
PE (Exe)
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:xmrig botnet:@nochmolox discovery evasion exploit infostealer miner spyware
Behaviour
Creates scheduled task(s)
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Downloads MZ/PE file
Executes dropped EXE
Possible privilege escalation attempt
Stops running service(s)
XMRig Miner payload
Modifies security service
RedLine
RedLine payload
xmrig
Malware Config
C2 Extraction:
179.43.187.8:22378
Unpacked files
SH256 hash:
bd653bdfe4b140562c282d03fcab9fa976ebe1db9c315dc8dd0b911313a1faef
MD5 hash:
dd4ff67dc5444c0977d5b8275fa1306b
SHA1 hash:
996329cfae30191c73c888e18d095fee5e8ce1c0
SH256 hash:
e803ddc18558dca04c7705867278ab91678921e0825e2f54070bba456702ddd1
MD5 hash:
08d5bb6406c16b548273757aef5b9e52
SHA1 hash:
e02adc47cac53b317bdb080863d4195a2e6c1754
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments