MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 202fb4f80fa9790ba37aed5cf78a54b21391d4f42a2d49d68d9c15f4f6507893. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 202fb4f80fa9790ba37aed5cf78a54b21391d4f42a2d49d68d9c15f4f6507893
SHA3-384 hash: acdac62ad6c19106a93ae443abda817ffc41e99f779fa519f971fc99e929395acef8956ff5640e142395d3e4f9b3a271
SHA1 hash: 75d31595f6088d637835d4c69bf4a153d85f7090
MD5 hash: a10d8b036aaed45559bd64374d6ac9dc
humanhash: nebraska-whiskey-edward-rugby
File name:lucim.exe
Download: download sample
Signature CoinMiner
File size:4'180'992 bytes
First seen:2022-10-10 07:19:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a1e1db4ddf300b66a3afa3056ec32bfd (14 x CoinMiner, 2 x PripyatMiner)
ssdeep 98304:UoYmyPQdQ1tKYhVHxisvf5F1atyMqZ8jtkeA61:UoYmy6+KYbASYtyMCep
Threatray 2'756 similar samples on MalwareBazaar
TLSH T1F8162336910718F9D437F33481D97B7999B2FC2C4A281A1E0E4FCB34AFE0E5619A4DA5
TrID 43.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
27.6% (.EXE) Win64 Executable (generic) (10523/12/4)
13.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) OS/2 Executable (generic) (2029/13)
5.2% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter JAMESWT_WT
Tags:bitbucket-org CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
207
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Using the Windows Management Instrumentation requests
Running batch commands
Creating a file in the Program Files subdirectories
Creating a process from a recently created file
Creating a file in the Windows subdirectories
Changing the hosts file
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
adwa.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Creates files in the system32 config directory
Found hidden mapped module (file has been removed from disk)
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sample is not signed and drops a device driver
Uses cmd line tools excessively to alter registry or file data
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 720102 Sample: lucim.exe Startdate: 11/10/2022 Architecture: WINDOWS Score: 100 63 xmr.2miners.com 2->63 65 rentry.org 2->65 67 Multi AV Scanner detection for dropped file 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 Yara detected Xmrig cryptocurrency miner 2->71 73 2 other signatures 2->73 9 updaterload.exe 3 2->9         started        13 lucim.exe 1 2->13         started        signatures3 process4 file5 55 C:\Windows\Temp\38D8.tmp, PE32+ 9->55 dropped 57 C:\Program Filesbehaviorgraphoogle\Libs\WR64.sys, PE32+ 9->57 dropped 77 Protects its processes via BreakOnTermination flag 9->77 79 Writes to foreign memory regions 9->79 81 Modifies the context of a thread in another process (thread injection) 9->81 87 2 other signatures 9->87 15 cmd.exe 9->15         started        18 cmd.exe 9->18         started        20 conhost.exe 9->20         started        28 3 other processes 9->28 59 C:\Program Filesbehaviorgraphoogle\...\updaterload.exe, PE32+ 13->59 dropped 61 C:\Windows\System32\drivers\etc\hosts, ISO-8859 13->61 dropped 83 Modifies the hosts file 13->83 85 Adds a directory exclusion to Windows Defender 13->85 22 cmd.exe 1 13->22         started        24 powershell.exe 19 13->24         started        26 cmd.exe 1 13->26         started        30 2 other processes 13->30 signatures6 process7 signatures8 39 11 other processes 15->39 41 5 other processes 18->41 89 Adds a directory exclusion to Windows Defender 20->89 32 cmd.exe 20->32         started        34 powershell.exe 20->34         started        91 Uses cmd line tools excessively to alter registry or file data 22->91 93 Uses powercfg.exe to modify the power settings 22->93 95 Modifies power options to not sleep / hibernate 22->95 43 11 other processes 22->43 97 Uses schtasks.exe or at.exe to add and modify task schedules 24->97 36 conhost.exe 24->36         started        45 5 other processes 26->45 99 Creates files in the system32 config directory 28->99 47 4 other processes 28->47 49 3 other processes 30->49 process9 signatures10 51 conhost.exe 32->51         started        53 conhost.exe 34->53         started        75 Adds a directory exclusion to Windows Defender 36->75 process11
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2022-10-04 20:01:11 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig evasion miner upx
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Loads dropped DLL
Drops file in Drivers directory
Executes dropped EXE
Stops running service(s)
UPX packed file
XMRig Miner payload
Modifies security service
xmrig
Unpacked files
SH256 hash:
202fb4f80fa9790ba37aed5cf78a54b21391d4f42a2d49d68d9c15f4f6507893
MD5 hash:
a10d8b036aaed45559bd64374d6ac9dc
SHA1 hash:
75d31595f6088d637835d4c69bf4a153d85f7090
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments