MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2ddc60e198968b3b6a2c900fa225cec6ff3340e67972ebf3b94938423f3dd347. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 16


Intelligence 16 IOCs YARA 8 File information Comments

SHA256 hash: 2ddc60e198968b3b6a2c900fa225cec6ff3340e67972ebf3b94938423f3dd347
SHA3-384 hash: 351ab3792b8e97d8dcca50dd7ad6ec4a7c758a040db277b3116064df9fcb4e5bca1c45763d39644ded08c2c62263080b
SHA1 hash: 4731feb01d22764ef8ac79e12b23541927487329
MD5 hash: b806b48f24ea908350285941972e2a94
humanhash: solar-green-lima-burger
File name:hack_game.exe
Download: download sample
Signature CoinMiner
File size:18'637'824 bytes
First seen:2026-02-11 12:17:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2b4a9a9cf090b9abc323b2037a41ed31 (1 x CoinMiner)
ssdeep 49152:vriz7S0kk0Q6Wda2C9Zpt44FIM2EScChdC1lhNiCyoQcJ7YR3L0HmJY18cJFk9nK:+CXV
Threatray 3 similar samples on MalwareBazaar
TLSH T1B7177C269F805B8AF6DC0CABC07D1A1B6BF36780D0B3F2CD67926503269FE1C5729558
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter burger
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
https://www.mediafire.com/file/wnx87sit7z7jcqz/cheatt_gamer.rar/file
Verdict:
Malicious activity
Analysis date:
2026-02-04 18:53:13 UTC
Tags:
possible-phishing

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
vmdetect autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Launching a process
Creating a file in the Program Files subdirectories
Creating a window
DNS request
Enabling autorun by creating a file
Verdict:
Adware
File Type:
exe x64
First seen:
2026-02-01T04:48:00Z UTC
Last seen:
2026-02-11T20:54:00Z UTC
Hits:
~10
Detections:
RiskTool.Miner.UDP.C&C not-a-virus:RiskTool.Win32.Miner.raj
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
72 / 100
Signature
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Schtasks Creation Or Modification With SYSTEM Privileges
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1867362 Sample: hack_game.exe Startdate: 11/02/2026 Architecture: WINDOWS Score: 72 19 Multi AV Scanner detection for dropped file 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Sigma detected: Invoke-Obfuscation CLIP+ Launcher 2->23 25 2 other signatures 2->25 7 hack_game.exe 1 2->7         started        process3 file4 17 C:\Program Files (x86)\...\MSIwindowsI.exe, PE32+ 7->17 dropped 10 cmd.exe 1 7->10         started        process5 signatures6 27 Uses schtasks.exe or at.exe to add and modify task schedules 10->27 13 conhost.exe 10->13         started        15 schtasks.exe 1 10->15         started        process7
Gathering data
Threat name:
Win64.Trojan.Kepavll
Status:
Malicious
First seen:
2026-02-01 09:32:30 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig execution miner persistence
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Drops file in Program Files directory
Suspicious use of SetThreadContext
Executes dropped EXE
Badlisted process makes network request
XMRig Miner payload
Xmrig family
xmrig
Unpacked files
SH256 hash:
2ddc60e198968b3b6a2c900fa225cec6ff3340e67972ebf3b94938423f3dd347
MD5 hash:
b806b48f24ea908350285941972e2a94
SHA1 hash:
4731feb01d22764ef8ac79e12b23541927487329
SH256 hash:
d06238a4fc7bfded8e86b0fb4a49b3d968e6f8edec949e8ac0a19617447891b7
MD5 hash:
87451abe2cd7ac32dc723997c1341c19
SHA1 hash:
dda81b39a86bfc833981a58dc7a68da859f74d6c
Detections:
XMRig MAL_XMR_Miner_May19_1 XMRIG_Monero_Miner MALWARE_Win_CoinMiner02
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:SUSP_Double_Base64_Encoded_Executable_RID34CC
Author:Florian Roth
Description:Detects an executable that has been encoded with base64 twice
Reference:https://twitter.com/TweeterCyber/status/1189073238803877889
Rule name:telebot_framework
Author:vietdx.mb
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

CoinMiner

Executable exe 2ddc60e198968b3b6a2c900fa225cec6ff3340e67972ebf3b94938423f3dd347

(this sample)

Comments