MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f0eef776c31bc4af21280f8b2e7f82dda4682fe97214347479b6500848324e87. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 8


Intelligence 8 IOCs 2 YARA File information Comments

SHA256 hash: f0eef776c31bc4af21280f8b2e7f82dda4682fe97214347479b6500848324e87
SHA3-384 hash: 872beb97bfbdab72c3b44013e9c727ba97170a28cd07ab4352b9e8007599490f1b9ef195f67e76620f421277305f4ced
SHA1 hash: 010a3abe5fde6040fe5beb465eca26e4615ff89f
MD5 hash: b137fff4b205d540cccf36b16d3c5604
humanhash: connecticut-march-connecticut-ceiling
File name:B137FFF4B205D540CCCF36B16D3C5604.exe
Download: download sample
Signature CoinMiner
File size:4'969'571 bytes
First seen:2021-08-28 20:30:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xZCvLUBsg3bsj4tZ+f/ufmD1H3K2lR2vOOlMi5aGFpG9jKbmdbqRF:xSLUCg3bsjl1H3Tl+lMikG29jiRF
Threatray 426 similar samples on MalwareBazaar
TLSH T1D3363301F7E3C0FBEE534036635CDBF769B8CBD002484AEBA7A4D7881D68496612EE55
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:CoinMiner exe


Avatar
abuse_ch
CoinMiner C2:
http://84.246.85.16/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://84.246.85.16/ https://threatfox.abuse.ch/ioc/201706/
37.0.10.63:6236 https://threatfox.abuse.ch/ioc/201740/

Intelligence


File Origin
# of uploads :
1
# of downloads :
245
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
B137FFF4B205D540CCCF36B16D3C5604.exe
Verdict:
No threats detected
Analysis date:
2021-08-28 20:32:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Sending a UDP request
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Creating a window
Creating a process with a hidden window
Connection attempt to an infection source
Launching cmd.exe command interpreter
Creating a file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Delayed reading of the file
Creating a file in the Program Files subdirectories
Possible injection to a system process
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Blocking the Windows Defender launch
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Result
Threat name:
Cookie Stealer RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Submitted sample is a known malware sample
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Cookie Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 473280 Sample: apgKDBpMxB.exe Startdate: 28/08/2021 Architecture: WINDOWS Score: 100 111 192.168.2.4, 443, 49257, 49710 unknown unknown 2->111 113 google.vrthcobj.com 34.97.69.225 GOOGLEUS United States 2->113 115 2 other IPs or domains 2->115 165 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->165 167 Found malware configuration 2->167 169 Antivirus detection for URL or domain 2->169 171 19 other signatures 2->171 12 apgKDBpMxB.exe 18 2->12         started        15 rundll32.exe 2->15         started        signatures3 process4 file5 91 C:\Users\user\AppData\...\setup_install.exe, PE32 12->91 dropped 93 C:\Users\user\...\Mon17f6c0b17fea56f.exe, PE32 12->93 dropped 95 C:\Users\user\AppData\...\Mon17c34df3c4.exe, PE32 12->95 dropped 97 13 other files (8 malicious) 12->97 dropped 17 setup_install.exe 1 12->17         started        21 rundll32.exe 15->21         started        process6 dnsIp7 99 hsiens.xyz 172.67.142.91, 49742, 80 CLOUDFLARENETUS United States 17->99 101 127.0.0.1 unknown unknown 17->101 155 Performs DNS queries to domains with low reputation 17->155 157 Adds a directory exclusion to Windows Defender 17->157 23 cmd.exe 1 17->23         started        25 cmd.exe 1 17->25         started        28 cmd.exe 1 17->28         started        30 8 other processes 17->30 159 Writes to foreign memory regions 21->159 161 Allocates memory in foreign processes 21->161 163 Creates a thread in another existing process (thread injection) 21->163 signatures8 process9 signatures10 32 Mon17f6c0b17fea56f.exe 23->32         started        179 Submitted sample is a known malware sample 25->179 181 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->181 183 Obfuscated command line found 25->183 185 4 other signatures 25->185 35 powershell.exe 25 25->35         started        37 Mon17c34df3c4.exe 28->37         started        41 Mon177ce99a7b2d0c381.exe 30->41         started        43 Mon173276f6f76039.exe 30->43         started        45 Mon1709bbd35ce59.exe 1 13 30->45         started        47 4 other processes 30->47 process11 dnsIp12 131 Detected unpacking (changes PE section rights) 32->131 133 Machine Learning detection for dropped file 32->133 135 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 32->135 153 3 other signatures 32->153 49 explorer.exe 32->49 injected 125 2 other IPs or domains 37->125 81 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 37->81 dropped 83 C:\Users\user\AppData\...\softokn3[1].dll, PE32 37->83 dropped 85 C:\Users\user\AppData\...\mozglue[1].dll, PE32 37->85 dropped 89 9 other files (none is malicious) 37->89 dropped 137 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 37->137 139 Tries to harvest and steal browser information (history, passwords, etc) 37->139 141 Tries to steal Crypto Currency Wallets 37->141 117 37.0.10.237, 49749, 49761, 80 WKD-ASIE Netherlands 41->117 119 37.0.10.214, 49748, 80 WKD-ASIE Netherlands 41->119 121 ipinfo.io 34.117.59.81, 443, 49756 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 41->121 143 May check the online IP address of the machine 41->143 145 Disable Windows Defender real time protection (registry) 41->145 54 cmd.exe 43->54         started        56 dllhost.exe 43->56         started        123 ip-api.com 208.95.112.1, 49743, 80 TUT-ASUS United States 45->123 127 3 other IPs or domains 45->127 87 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 45->87 dropped 147 Contains functionality to steal Chrome passwords or cookies 45->147 129 3 other IPs or domains 47->129 149 Antivirus detection for dropped file 47->149 151 Creates processes via WMI 47->151 58 Mon1720268f847c3.exe 47->58         started        file13 signatures14 process15 dnsIp16 103 45.147.228.157 COMBAHTONcombahtonGmbHDE Germany 49->103 105 109.98.58.98 RTDBucharestRomaniaRO Romania 49->105 109 3 other IPs or domains 49->109 71 C:\Users\user\AppData\Roaming\dfjegit, PE32 49->71 dropped 73 C:\Users\user\AppData\Local\Temp\8DC6.exe, PE32 49->73 dropped 75 C:\Users\user\AppData\Local\TempFDE.exe, PE32 49->75 dropped 79 2 other files (none is malicious) 49->79 dropped 173 System process connects to network (likely due to code injection or exploit) 49->173 175 Benign windows process drops PE files 49->175 177 Hides that the sample has been downloaded from the Internet (zone.identifier) 49->177 60 cmd.exe 54->60         started        63 conhost.exe 54->63         started        107 live.goatgame.live 172.67.222.125, 443, 49744 CLOUDFLARENETUS United States 58->107 77 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 58->77 dropped 65 conhost.exe 58->65         started        file17 signatures18 process19 signatures20 187 Obfuscated command line found 60->187 189 Uses ping.exe to sleep 60->189 67 findstr.exe 60->67         started        69 Prendero.exe.com 60->69         started        process21
Threat name:
Win32.Trojan.SmallDownloader
Status:
Malicious
First seen:
2021-08-24 05:58:19 UTC
AV detection:
34 of 46 (73.91%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar botnet:29.08 botnet:706 botnet:norman botnet:pub1 botnet:supertraff aspackv2 backdoor evasion infostealer persistence stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Vidar
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
Malware Config
C2 Extraction:
viacetequn.site:80
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
45.14.49.184:25321
135.148.139.222:1494
95.181.152.47:15089
Unpacked files
SH256 hash:
8963306b8dc579e19514edd491facb365cd40e16aaeecd475f2c355a724272bc
MD5 hash:
400653e50c7a17bba9549b6a191c0a1f
SHA1 hash:
11a7ce981de51465001bc0dfb3c348b4f2284d84
SH256 hash:
8a50b4a3ca9075a5e08e3f806db877c1b88305d13ba351276beed4a6fec8dd26
MD5 hash:
e75e1440eb164e13fa365e10ff894e7f
SHA1 hash:
0c24e02233a60a2eaeb293636c306d60acafe1ae
SH256 hash:
3001a2f2078c662d868c8893fac751274028d1b43ba3a8d96ae703a162d25892
MD5 hash:
896f2994b5067ca2dde8a62d8fc79328
SHA1 hash:
0230b505866ece8874ccf4a3fa939ff26be0ea77
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
ca87fde2a5a4754b71500a06ca64cb722c37c8f666fb680cabb4b74795a2bb92
MD5 hash:
f4bc3c5939d2cc8a4393db4db2250c4d
SHA1 hash:
add52a16ccbc719e1c1cefcc8f75fd57a91fdcb5
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
6ae92b60159ecdf3d41e963de606ac40d7ec89dc90b01d9bd7e52b287565d83a
MD5 hash:
eb94c3be019dcd9205521788c7b3ee48
SHA1 hash:
97c4411980ba98f8db91375023c426c28cf41ae3
SH256 hash:
710c8df4e791a0f4ac8a7351c0c718a6ddb685a3d57abfd2c064c398617bb9b1
MD5 hash:
4ffcfe89a6f218943793ff6ea9bb5e79
SHA1 hash:
8ff66c6fe276857ba0ce6f533d383813e5ce6943
SH256 hash:
9e4f0ab14c673270654fa7a689486b9c2b14a767660b66bbcfb6ab81ef580662
MD5 hash:
3c53ed79787e6cab25ffc3b71b35939d
SHA1 hash:
7e8f8d68f6daf9b55413e54d626aa35c39d850a5
SH256 hash:
29a29ee43326d77667ba594f017fa6650b572492ca956ee39aa1fd682f0665ac
MD5 hash:
877b74e896435f7861081af783d6ada7
SHA1 hash:
7681b7ead54a243b6695c967b0a8b5ca953b4eb7
SH256 hash:
b85d261f8298cd9fa73be088677da6518109f110107f18e518582873b67f432d
MD5 hash:
8091fc54ea99137a95f1ffb1443c2f24
SHA1 hash:
42e4690c8360d1993e88d0c0762989e4a352e203
SH256 hash:
993354f135ae67e7106046c58e155ce2103480544478b19dce9cba19218dfaf0
MD5 hash:
2bb3b94d8a88e9a1ced303bb6d01e5c5
SHA1 hash:
f9978194881887c69e736469b115f1f54f571430
SH256 hash:
30310552c42940a14e0594c1ab92995ee780c9d973b4d33e21ddcb23e435206c
MD5 hash:
2c7318a9087a5671e5fd47c5036eb523
SHA1 hash:
33384da1830d311686c0f777aa8b6693be3e5309
SH256 hash:
897477f80f3d5aea3c7afdfebc819dd754d7bbca14116020181cab9e7731d7e0
MD5 hash:
2e3fae5c25851e0dc96e9164572baabb
SHA1 hash:
144f32d61a914378caada25fca2915deb8b64dd8
SH256 hash:
1efd923f0ccb594b67ca1497717cdf6ffbb2ae0659222b19238fa8ec02a87492
MD5 hash:
dae1ff966607ce651e6f056c3479e6b0
SHA1 hash:
161719144d94105f759d783aa63b6588caaefc26
SH256 hash:
7bb7152c759400c5e0a61bbdfdcf911d1bf579431a85b75f1eccfa893716f318
MD5 hash:
15f99926cfbb46a214544991e9ed22fe
SHA1 hash:
1efb1d31951514eb40eb5eaf969c690b9ad98b90
SH256 hash:
f0eef776c31bc4af21280f8b2e7f82dda4682fe97214347479b6500848324e87
MD5 hash:
b137fff4b205d540cccf36b16d3c5604
SHA1 hash:
010a3abe5fde6040fe5beb465eca26e4615ff89f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments