MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4653c9115c8cb40430cb89e38440047efa8f44745d1d3b761ed936b63500949f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 9


Intelligence 9 IOCs YARA 15 File information Comments

SHA256 hash: 4653c9115c8cb40430cb89e38440047efa8f44745d1d3b761ed936b63500949f
SHA3-384 hash: f3c89a1cc7d865bc5a690212645642bfb346849b1162e1a97e724bce56721f33f2959eea37ba50983dec71dde6a58759
SHA1 hash: 357c51fee77d59b5fa5a9775202dceb833b1c8cc
MD5 hash: 64a260f7b5bd724d8782f371828a2bcb
humanhash: pasta-dakota-fix-lima
File name:file
Download: download sample
Signature CoinMiner
File size:6'704'816 bytes
First seen:2025-11-05 21:22:00 UTC
Last seen:2025-11-05 21:22:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4e46247358a7f206d2eb2373e1ec67ff (1 x CoinMiner)
ssdeep 98304:VHp8KDPD82p5T7ENWLDmp1LrHJWRy0aMbndul5hL9BHRWCE5wn3kk3a4g9C5E+Ij:T8uPDJp5TPiHkEMbdc5X3kk3NVhDO
TLSH T1316633017BFC2001F2B7BFB26EFA5610497ABC2A2E7AD55D1591429F5A70EC05E6033B
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:CoinMiner dropped-by-amadey exe fbf543


Avatar
Bitsight
url: http://178.16.54.200/files/6629342726/OcAd0xD.exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
175
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2025-11-05 21:22:26 UTC
Tags:
pastebin auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug explorer fingerprint lolbin microsoft_visual_cc packed signed
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2025-11-05 21:22:24 UTC
File Type:
PE+ (Exe)
Extracted files:
25
AV detection:
8 of 23 (34.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Unpacked files
SH256 hash:
4653c9115c8cb40430cb89e38440047efa8f44745d1d3b761ed936b63500949f
MD5 hash:
64a260f7b5bd724d8782f371828a2bcb
SHA1 hash:
357c51fee77d59b5fa5a9775202dceb833b1c8cc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20
Author:Florian Roth (Nextron Systems)
Description:Detects XMRIG crypto coin miners
Reference:https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
Rule name:PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20_RID33BA
Author:Florian Roth
Description:Detects XMRIG crypto coin miners
Reference:https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
Rule name:Rooter
Author:Seth Hardy
Description:Rooter
Rule name:RooterStrings
Author:Seth Hardy
Description:Rooter Identifying Strings
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 4653c9115c8cb40430cb89e38440047efa8f44745d1d3b761ed936b63500949f

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments