MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 201fb376d18d216baf555ff6afdc0754f94c4475ceaf3b5c713473833cc60aa5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 201fb376d18d216baf555ff6afdc0754f94c4475ceaf3b5c713473833cc60aa5
SHA3-384 hash: 508ab12866742f3ba71261ee56cc1c579e9b771f0cf9f12c4d12e55570f38f4724dacc7c25c88b489d0ea390ff7ed6a7
SHA1 hash: 36e3c72d06975bbf8275f96a9978be4faa6a7848
MD5 hash: 91d04346e7f17b8e2aae64d27f042adc
humanhash: vermont-kitten-mango-timing
File name:yljlbesdmoas.exe
Download: download sample
Signature CoinMiner
File size:2'650'624 bytes
First seen:2023-12-01 20:49:34 UTC
Last seen:2023-12-01 22:21:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash de41d4e0545d977de6ca665131bb479a (85 x CoinMiner)
ssdeep 49152:knvVwOy5ObqmiB9hWGw54UYmbRx+USKVCZjOypc9cofHWJ/pviFkO:kGx5myXWGIYmbRxBS5jOyq9cofHWJRlO
Threatray 10 similar samples on MalwareBazaar
TLSH T181C533835B980A61E47D0673A8CF6825B44C6CC14F94F8DF64E1B3C499216EA5DF8ECB
TrID 49.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
31.8% (.EXE) Win64 Executable (generic) (10523/12/4)
6.1% (.EXE) OS/2 Executable (generic) (2029/13)
6.0% (.EXE) Generic Win/DOS Executable (2002/3)
6.0% (.EXE) DOS Executable Generic (2000/1)
Reporter smica83
Tags:CoinMiner exe HUN XMRIG

Intelligence


File Origin
# of uploads :
2
# of downloads :
372
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
yljlbesdmoas.exe
Verdict:
Malicious activity
Analysis date:
2023-12-01 20:53:16 UTC
Tags:
miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Running batch commands
Deleting a system file
Launching a process
Creating a service
Creating a file
Launching a service
Creating a process from a recently created file
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Creating a file in the system32 subdirectories
DNS request
Connecting to a cryptocurrency mining pool
Sending a custom TCP request
Loading a system driver
Enabling autorun for a service
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win64.Trojan.Zusy
Status:
Malicious
First seen:
2023-12-01 19:50:02 UTC
File Type:
PE+ (Exe)
AV detection:
22 of 36 (61.11%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig evasion miner persistence upx
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
UPX packed file
Creates new service(s)
Stops running service(s)
XMRig Miner payload
xmrig
Unpacked files
SH256 hash:
201fb376d18d216baf555ff6afdc0754f94c4475ceaf3b5c713473833cc60aa5
MD5 hash:
91d04346e7f17b8e2aae64d27f042adc
SHA1 hash:
36e3c72d06975bbf8275f96a9978be4faa6a7848
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments