MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f57855bf23ce70fccbad6dec4c7d9e97710f222f98dfa0141762d66e56b6192d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments 1

SHA256 hash: f57855bf23ce70fccbad6dec4c7d9e97710f222f98dfa0141762d66e56b6192d
SHA3-384 hash: baf74b2a21b12fc9a7593954618c0e54d30a0636f19b781755b566f4c77d368e9c1bb1891cd59af6b21af8ba08d3ccd1
SHA1 hash: da239d9de0483bb24a62acbb92a96f98008e55fd
MD5 hash: 030d32c42f8d6eed949f5a40f835be2f
humanhash: apart-three-magnesium-bluebird
File name:030d32c42f8d6eed949f5a40f835be2f
Download: download sample
Signature CoinMiner
File size:343'552 bytes
First seen:2021-12-16 02:59:30 UTC
Last seen:2021-12-16 04:39:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4bb8a39044d1acb8817ffc34236f365c (14 x RedLineStealer, 2 x ArkeiStealer, 1 x Tofsee)
ssdeep 6144:goVlxPH+5hD26j8vr3gbL3shpAArO3dSsT9cvU2:vVlxHB6j8vrQbLSAAriA
Threatray 181 similar samples on MalwareBazaar
TLSH T1FB749D00A6A1D435F5B312F85AB593BDA53F7AA16B3490CF13D016EA5B386E0EC3171B
File icon (PE):PE icon
dhash icon badacabecee6baa6 (95 x Stop, 87 x RedLineStealer, 62 x Smoke Loader)
Reporter zbetcheckin
Tags:32 CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
183
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file
Launching the process to change the firewall settings
Creating a service
Creating a process from a recently created file
Sending a custom TCP request
Launching a service
Launching the default Windows debugger (dwwin.exe)
DNS request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Tofsee
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 540709 Sample: FeqiGh80RW Startdate: 16/12/2021 Architecture: WINDOWS Score: 100 47 microsoft-com.mail.protection.outlook.com 2->47 53 Found malware configuration 2->53 55 Yara detected Tofsee 2->55 57 Sigma detected: Suspect Svchost Activity 2->57 59 6 other signatures 2->59 8 xtgsadel.exe 2->8         started        11 FeqiGh80RW.exe 2 2->11         started        14 svchost.exe 1 2->14         started        16 3 other processes 2->16 signatures3 process4 file5 65 Detected unpacking (changes PE section rights) 8->65 67 Detected unpacking (overwrites its own PE header) 8->67 69 Writes to foreign memory regions 8->69 75 2 other signatures 8->75 18 svchost.exe 1 8->18         started        45 C:\Users\user\AppData\Local\...\xtgsadel.exe, PE32 11->45 dropped 71 Uses netsh to modify the Windows network and firewall settings 11->71 73 Modifies the windows firewall 11->73 22 cmd.exe 1 11->22         started        25 netsh.exe 3 11->25         started        27 cmd.exe 2 11->27         started        29 3 other processes 11->29 signatures6 process7 dnsIp8 49 mubrikych.top 91.224.22.134, 443, 49778, 49793 AS-REGRU Russian Federation 18->49 51 microsoft-com.mail.protection.outlook.com 104.47.53.36, 25, 49777 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->51 61 System process connects to network (likely due to code injection or exploit) 18->61 63 Deletes itself after installation 18->63 43 C:\Windows\SysWOW64\...\xtgsadel.exe (copy), PE32 22->43 dropped 31 conhost.exe 22->31         started        33 conhost.exe 25->33         started        35 conhost.exe 27->35         started        37 conhost.exe 29->37         started        39 conhost.exe 29->39         started        41 conhost.exe 29->41         started        file9 signatures10 process11
Threat name:
Win32.Backdoor.Tofsee
Status:
Malicious
First seen:
2021-12-16 03:00:09 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:tofsee family:xmrig evasion miner persistence trojan
Behaviour
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Deletes itself
Creates new service(s)
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
XMRig Miner Payload
Tofsee
Windows security bypass
xmrig
Malware Config
C2 Extraction:
mubrikych.top
oxxyfix.xyz
Unpacked files
SH256 hash:
f57855bf23ce70fccbad6dec4c7d9e97710f222f98dfa0141762d66e56b6192d
MD5 hash:
030d32c42f8d6eed949f5a40f835be2f
SHA1 hash:
da239d9de0483bb24a62acbb92a96f98008e55fd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_tofsee_w0
Author:akrasuski1

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe f57855bf23ce70fccbad6dec4c7d9e97710f222f98dfa0141762d66e56b6192d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-16 02:59:33 UTC

url : hxxp://185.7.214.171:8080/6.php