MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 41e99d281f1093e49ef23383633e481b3a18afd2386f94371fb215dec16ba2a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 41e99d281f1093e49ef23383633e481b3a18afd2386f94371fb215dec16ba2a0
SHA3-384 hash: 4ef2ad5f53fd0c9f2015464933e7a52cd2e3c8d1cee3c738e459be63ee296ccac9fd077c241e4915f8c58b480761e025
SHA1 hash: 4b446f914514220b39f918175f2c960098c09e90
MD5 hash: 25982cbfee82ec33c8a1c879ece423cd
humanhash: ink-spring-papa-solar
File name:25982cbfee82ec33c8a1c879ece423cd.exe
Download: download sample
Signature CoinMiner
File size:2'040'832 bytes
First seen:2022-02-03 14:46:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 02549ff92b49cce693542fc9afb10102 (84 x CoinMiner, 2 x CoinMiner.XMRig, 1 x AgentTesla)
ssdeep 24576:aTV4XGrg9hvZOOa5fJjDPjwPzWOTxAl+Hl+zg2pPxy6Yll77vJpFkmMMuna:cDkhvZnmOPzWQKCl+zgapBYlnc
Threatray 829 similar samples on MalwareBazaar
TLSH T1AC9533BD59310F97D38E0037FB484BAD8CB2E8B46E359556C39648F962246FB6650CCC
Reporter abuse_ch
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
211
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
41e99d281f1093e49ef23383633e481b3a18afd2386f94371fb215dec16ba2a0.zip
Verdict:
Suspicious activity
Analysis date:
2022-02-03 15:54:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a process from a recently created file
Creating a process with a hidden window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CallSleep
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
BitCoin Miner SilentXMRMiner
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win64.Trojan.Wovdnut
Status:
Malicious
First seen:
2022-02-01 00:30:42 UTC
File Type:
PE+ (Exe)
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
41e99d281f1093e49ef23383633e481b3a18afd2386f94371fb215dec16ba2a0
MD5 hash:
25982cbfee82ec33c8a1c879ece423cd
SHA1 hash:
4b446f914514220b39f918175f2c960098c09e90
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 41e99d281f1093e49ef23383633e481b3a18afd2386f94371fb215dec16ba2a0

(this sample)

  
Delivery method
Distributed via web download

Comments