MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1d8b78fcbb6f3e68c24f759b86c7cea38f5b5642a9d2c556cc9c35a7ee24b8d4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
CoinMiner
Vendor detections: 14
| SHA256 hash: | 1d8b78fcbb6f3e68c24f759b86c7cea38f5b5642a9d2c556cc9c35a7ee24b8d4 |
|---|---|
| SHA3-384 hash: | 9cbe354b3c14a0afba69126514c3c492b2c8b4f4230cd7957361a67a7926f93e3dd5cc47967482d7a417d98d293624b8 |
| SHA1 hash: | 3fafa99c551edd87e9faadefc600f324c8203542 |
| MD5 hash: | 57efeee8a462cb7aad1342613a7afb96 |
| humanhash: | mockingbird-freddie-cola-indigo |
| File name: | 57efeee8a462cb7aad1342613a7afb96 |
| Download: | download sample |
| Signature | CoinMiner |
| File size: | 268'288 bytes |
| First seen: | 2022-06-06 11:31:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1dd05aad8ce2a14fd9b3b972a5a8dca9 (2 x RedLineStealer, 1 x CoinMiner, 1 x ArkeiStealer) |
| ssdeep | 6144:2dd/kJAL0XDUpjTDuvxYoGNV8lkv8YUotxarKx9F34wb134XYkl:2dd8g0QJCvxY1NVfvhUotxzx9JoXY |
| TLSH | T1D5448E00B7A0C035F1B716F449BA93B8B93EBAA06B35D8CB62D416EE46356E1DC31317 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10523/12/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4505/5/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| File icon (PE): | |
| dhash icon | 25ec1370399b9b91 (21 x Smoke Loader, 18 x RedLineStealer, 10 x Amadey) |
| Reporter | |
| Tags: | 32 CoinMiner exe |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
jotunheim.name
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CoinMiner_Strings |
|---|---|
| Author: | Florian Roth |
| Description: | Detects mining pool protocol string in Executable |
| Reference: | https://minergate.com/faq/what-pool-address |
| Rule name: | MALWARE_Win_Tofsee |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Tofsee |
| Rule name: | MAL_XMR_Miner_May19_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Monero Crypto Coin Miner |
| Reference: | https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
| Rule name: | MAL_XMR_Miner_May19_1_RID2E1B |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Monero Crypto Coin Miner |
| Reference: | https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
| Rule name: | MINER_monero_mining_detection |
|---|---|
| Author: | Trellix ATR team |
| Description: | Monero mining software |
| Rule name: | PUA_Crypto_Mining_CommandLine_Indicators_Oct21 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects command line parameters often used by crypto mining software |
| Reference: | https://www.poolwatch.io/coin/monero |
| Rule name: | win_tofsee_w0 |
|---|---|
| Author: | akrasuski1 |
| Rule name: | XMRIG_Monero_Miner |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Monero mining software |
| Reference: | https://github.com/xmrig/xmrig/releases |
| Rule name: | XMRIG_Monero_Miner_RID2DC1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Monero mining software |
| Reference: | https://github.com/xmrig/xmrig/releases |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://62.204.41.23:9080/13.php