MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 03d0098801bb4b1f4f82d7878f630e7788ecf21bc5289e15f7c72d0fb00b09e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 19


Intelligence 19 IOCs YARA 25 File information Comments

SHA256 hash: 03d0098801bb4b1f4f82d7878f630e7788ecf21bc5289e15f7c72d0fb00b09e6
SHA3-384 hash: 0094a86385b1ae83f510db0687ab0d0621368aaeef2a42a8728c27b51b7be37fb43acba7b337ce56413dbee7d319bc60
SHA1 hash: 847a1d13a3473626871882780a2d9e660fadfcb9
MD5 hash: 879f5c7f156289b9d35b22e776a2d31a
humanhash: romeo-arizona-venus-fish
File name:njRAT v0.7d.exe
Download: download sample
Signature CoinMiner
File size:4'000'256 bytes
First seen:2025-08-03 20:09:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (35 x CoinMiner, 18 x AsyncRAT, 17 x BlankGrabber)
ssdeep 49152:yw5rhnDfVdyifgPRN40BCP5GoOvCnpazSJdeTNw9aKI0KKKKZuztdBR0+Df5fuc6:ZhhI4gPBBCQ3vCnkWJ2wwKJUQqf5z8
TLSH T10206BE534C009FC68D8CAFED3D5676F9B9F42BD01404123618ACA1AF9EF3B926D2259D
TrID 38.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
11.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
dhash icon 0e0765595965230e (1 x CoinMiner)
Reporter burger
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
njRAT v0.7d.exe
Verdict:
Malicious activity
Analysis date:
2025-08-03 20:11:14 UTC
Tags:
susp-powershell

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
bladabindi xmrig
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a custom TCP request
Сreating synchronization primitives
Creating a window
Using the Windows Management Instrumentation requests
DNS request
Creating a service
Launching a service
Loading a system driver
Unauthorized injection to a recently created process
Enabling autorun for a service
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected
Malware family:
Donut Injector
Verdict:
Malicious
Result
Threat name:
Njrat, SilentXMRMiner, Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Xmrig
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Njrat
Yara detected SilentXMRMiner
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1749495 Sample: njRAT v0.7d.exe Startdate: 03/08/2025 Architecture: WINDOWS Score: 100 60 pool.supportxmr.com 2->60 62 pool-nyc.supportxmr.com 2->62 66 Sigma detected: Xmrig 2->66 68 Malicious sample detected (through community Yara rule) 2->68 70 Antivirus detection for dropped file 2->70 72 10 other signatures 2->72 10 njRAT v0.7d.exe 3 2->10         started        14 svchost.exe 2->14         started        16 svchost.exe 2->16         started        18 4 other processes 2->18 signatures3 process4 file5 50 C:\Users\user\AppData\...\Services64.exe, PE32+ 10->50 dropped 52 C:\Users\user\AppData\...\njRAT v0.7d.exe, PE32 10->52 dropped 96 Encrypted powershell cmdline option found 10->96 20 Services64.exe 10->20         started        23 powershell.exe 23 10->23         started        25 njRAT v0.7d.exe 4 10->25         started        98 Changes security center settings (notifications, updates, antivirus, firewall) 14->98 27 MpCmdRun.exe 2 14->27         started        signatures6 process7 signatures8 74 Antivirus detection for dropped file 20->74 76 Multi AV Scanner detection for dropped file 20->76 78 Writes to foreign memory regions 20->78 82 2 other signatures 20->82 29 conhost.exe 7 20->29         started        33 svchost.exe 1 1 20->33         started        80 Loading BitLocker PowerShell Module 23->80 36 WmiPrvSE.exe 23->36         started        38 conhost.exe 23->38         started        40 conhost.exe 27->40         started        process9 dnsIp10 54 C:\Users\user\AppData\...\sihost64.exe, PE32+ 29->54 dropped 56 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 29->56 dropped 100 Found strings related to Crypto-Mining 29->100 102 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 29->102 104 Writes to foreign memory regions 29->104 106 3 other signatures 29->106 42 sihost64.exe 29->42         started        45 svchost.exe 29->45         started        58 127.0.0.1 unknown unknown 33->58 file11 signatures12 process13 dnsIp14 84 Antivirus detection for dropped file 42->84 86 Multi AV Scanner detection for dropped file 42->86 88 Writes to foreign memory regions 42->88 94 3 other signatures 42->94 48 conhost.exe 2 42->48         started        64 104.243.33.118, 49681, 80 RELIABLESITEUS United States 45->64 90 Query firmware table information (likely to detect VMs) 45->90 92 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 45->92 signatures15 process16
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Dropper.Dapato
Status:
Malicious
First seen:
2025-08-03 20:10:44 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
21 of 24 (87.50%)
Threat level:
  3/5
Verdict:
malicious
Label(s):
donut_injector xmrig
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig defense_evasion discovery miner
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Obfuscated Files or Information: Command Obfuscation
Checks computer location settings
Cryptocurrency Miner
Executes dropped EXE
XMRig Miner payload
Xmrig family
xmrig
Unpacked files
SH256 hash:
03d0098801bb4b1f4f82d7878f630e7788ecf21bc5289e15f7c72d0fb00b09e6
MD5 hash:
879f5c7f156289b9d35b22e776a2d31a
SHA1 hash:
847a1d13a3473626871882780a2d9e660fadfcb9
SH256 hash:
bf853789b938bdc5da8aaeb52511379a332c7cf238266a21bfcb0318a62e85cb
MD5 hash:
473e1a7be89c3a727176d4f9f5a64b69
SHA1 hash:
501eb2c1432ff2b4e5ff582ad82d0fca152adebc
Detections:
SUSP_OBF_NET_Eazfuscator_String_Encryption_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MacOS_Cryptominer_Xmrig_241780a1
Author:Elastic Security
Rule name:MALWARE_Win_CoinMiner02
Author:ditekSHen
Description:Detects coinmining malware
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Multi_Cryptominer_Xmrig_f9516741
Author:Elastic Security
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:rig_win64_xmrig_6_13_1_xmrig
Author:yarGen Rule Generator
Description:rig_win64 - file xmrig.exe
Reference:https://github.com/Neo23x0/yarGen
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
Rule name:Windows_Cryptominer_Generic_f53cfb9b
Author:Elastic Security
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases
Rule name:xmrig_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteA

Comments