MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a7a9d6a874f65ea3689930a2af208a025fee0a3dc1ad5cb9c964cbadd2cacf1f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
CoinMiner
Vendor detections: 19
| SHA256 hash: | a7a9d6a874f65ea3689930a2af208a025fee0a3dc1ad5cb9c964cbadd2cacf1f |
|---|---|
| SHA3-384 hash: | 72a3368f98fac36fbb78182b1726a01ae302e0e252431fc577da403c3519751ddb1627d362d2c3ad07b0ca4f57f9830a |
| SHA1 hash: | 6a7a7ffac751cac29a6517b259a7b352ee16968a |
| MD5 hash: | 520caefefbbb176320652dba30a53442 |
| humanhash: | avocado-indigo-avocado-alaska |
| File name: | svchost.exe |
| Download: | download sample |
| Signature | CoinMiner |
| File size: | 10'147'840 bytes |
| First seen: | 2025-07-27 17:56:48 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f0ea7b7844bbc5bfa9bb32efdcea957c (57 x Sliver, 17 x CobaltStrike, 12 x AsyncRAT) |
| ssdeep | 196608:7zBOrtqruVo/g8ZEEVuGoA4n/Ic+s6QPxW:BqVoo8q2uGX4A1QP |
| Threatray | 1 similar samples on MalwareBazaar |
| TLSH | T16DA6AE56BAA500E8C8AAC138CA6A4113F7B1BC555730A7DF2B7476B91F33BD01E3A750 |
| TrID | 48.7% (.EXE) Win64 Executable (generic) (10522/11/4) 23.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 9.3% (.EXE) OS/2 Executable (generic) (2029/13) 9.2% (.EXE) Generic Win/DOS Executable (2002/3) 9.2% (.EXE) DOS Executable Generic (2000/1) |
| Magika | pebin |
| Reporter | |
| Tags: | CoinMiner exe |
Intelligence
File Origin
ESVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BLOWFISH_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for Blowfish constants |
| Rule name: | command_and_control |
|---|---|
| Author: | CD_R0M_ |
| Description: | This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__ConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | DetectGoMethodSignatures |
|---|---|
| Author: | Wyatt Tauber |
| Description: | Detects Go method signatures in unpacked Go binaries |
| Rule name: | Detect_Go_GOMAXPROCS |
|---|---|
| Author: | Obscurity Labs LLC |
| Description: | Detects Go binaries by the presence of runtime.GOMAXPROCS in the runtime metadata |
| Rule name: | GoBinTest |
|---|
| Rule name: | golang |
|---|
| Rule name: | Golangmalware |
|---|---|
| Author: | Dhanunjaya |
| Description: | Malware in Golang |
| Rule name: | golang_binary_string |
|---|---|
| Description: | Golang strings present |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | golang_duffcopy_amd64 |
|---|
| Rule name: | HiveRansomware |
|---|---|
| Author: | Dhanunjaya |
| Description: | Yara Rule To Detect Hive V4 Ransomware |
| Rule name: | identity_golang |
|---|---|
| Author: | Eric Yocam |
| Description: | find Golang malware |
| Rule name: | MacOS_Cryptominer_Xmrig_241780a1 |
|---|---|
| Author: | Elastic Security |
| Rule name: | MALWARE_Win_CoinMiner02 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects coinmining malware |
| Rule name: | MAL_XMR_Miner_May19_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Monero Crypto Coin Miner |
| Reference: | https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
| Rule name: | MAL_XMR_Miner_May19_1_RID2E1B |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Monero Crypto Coin Miner |
| Reference: | https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | Mimikatz_Generic |
|---|---|
| Author: | Still |
| Description: | attempts to match all variants of Mimikatz |
| Rule name: | Multi_Cryptominer_Xmrig_f9516741 |
|---|---|
| Author: | Elastic Security |
| Rule name: | ProgramLanguage_Golang |
|---|---|
| Author: | albertzsigovits |
| Description: | Application written in Golang programming language |
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | rig_win64_xmrig_6_13_1_xmrig |
|---|---|
| Author: | yarGen Rule Generator |
| Description: | rig_win64 - file xmrig.exe |
| Reference: | https://github.com/Neo23x0/yarGen |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | SHA512_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA384/SHA512 constants |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | WHIRLPOOL_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for WhirlPool constants |
| Rule name: | Windows_Cryptominer_Generic_f53cfb9b |
|---|---|
| Author: | Elastic Security |
| Rule name: | without_attachments |
|---|---|
| Author: | Antonio Sanchez <asanchez@hispasec.com> |
| Description: | Rule to detect the no presence of any attachment |
| Reference: | http://laboratorio.blogs.hispasec.com/ |
| Rule name: | with_urls |
|---|---|
| Author: | Antonio Sanchez <asanchez@hispasec.com> |
| Description: | Rule to detect the presence of an or several urls |
| Reference: | http://laboratorio.blogs.hispasec.com/ |
| Rule name: | XMRIG_Monero_Miner |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Monero mining software |
| Reference: | https://github.com/xmrig/xmrig/releases |
| Rule name: | xmrig_v1 |
|---|---|
| Author: | RandomMalware |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| DNS_METHODS | Performs DNS calls | vendor/golang.org/x/net/dns/dnsmessage.init vendor/golang.org/x/net/dns/dnsmessage::inittask vendor/golang.org/x/net/dns/dnsmessage.typeNames vendor/golang.org/x/net/dns/dnsmessage.classNames vendor/golang.org/x/net/dns/dnsmessage.rCodeNames vendor/golang.org/x/net/dns/dnsmessage.ErrNotStarted vendor/golang.org/x/net/dns/dnsmessage.ErrSectionDone vendor/golang.org/x/net/dns/dnsmessage.errBaseLen vendor/golang.org/x/net/dns/dnsmessage.errCalcLen vendor/golang.org/x/net/dns/dnsmessage.errReserved vendor/golang.org/x/net/dns/dnsmessage.errTooManyPtr vendor/golang.org/x/net/dns/dnsmessage.errInvalidPtr vendor/golang.org/x/net/dns/dnsmessage.errNilResouceBody vendor/golang.org/x/net/dns/dnsmessage.errResourceLen vendor/golang.org/x/net/dns/dnsmessage.errSegTooLong vendor/golang.org/x/net/dns/dnsmessage.errZeroSegLen vendor/golang.org/x/net/dns/dnsmessage.errResTooLong vendor/golang.org/x/net/dns/dnsmessage.errTooManyQuestions vendor/golang.org/x/net/dns/dnsmessage.errTooManyAnswers vendor/golang.org/x/net/dns/dnsmessage.errTooManyAuthorities vendor/golang.org/x/net/dns/dnsmessage.errTooManyAdditionals vendor/golang.org/x/net/dns/dnsmessage.errNonCanonicalName vendor/golang.org/x/net/dns/dnsmessage.errStringTooLong vendor/golang.org/x/net/dns/dnsmessage.errCompressedSRV vendor/golang.org/x/net/dns/dnsmessage.sectionNames |
| EXEC_METHODS | Can Execute Commands | os.StartProcess os/exec.Command os/exec.Command.func1 syscall.StartProcess syscall.StartProcess.func4 syscall.StartProcess.func3 syscall.StartProcess.func2 |
| FILE_IO_READ | Can Read Files | os.OpenFile os.openFileNolog |
| FILE_IO_WRITE | Can Create and Remove Files | os.Mkdir os.Mkdir.func1 os.MkdirAll os.WriteFile os.newFile os.newFileStatFromGetFileInformationByHandle |
| OS_METHODS | Can Execute OS commands | os.Kill |
| SYSCALL_METHODS | Can perform system-level operations | syscall.Mkdir syscall.Open |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.