MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5cff7e580d26fe455c988e3af21301d08c02581a99070c7998dcfb0e2aa26dbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 5cff7e580d26fe455c988e3af21301d08c02581a99070c7998dcfb0e2aa26dbb
SHA3-384 hash: 19b223acd858683d5b305fc4e0fade2461513c75ac5108ac9dfa1c91a0fa46f345e9428e5ca4a1f20bee7f25f18655a9
SHA1 hash: 25202b1fb226345caa3c822c7d8b9a4688eaacd1
MD5 hash: 168c26b51ec5c7668acb53805e7d5a18
humanhash: beryllium-equal-coffee-violet
File name:Dark Side.exe
Download: download sample
Signature CoinMiner
File size:3'269'120 bytes
First seen:2026-01-13 19:07:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a04338e07c426b2fefa044b2835c73ce (10 x CoinMiner)
ssdeep 98304:XcP1gblzBaFRqGMQZHBq9bAZ2S+UUQSeTceWew:q1KFaFRBMGHqA2BLeTMe
Threatray 57 similar samples on MalwareBazaar
TLSH T1A7E52242B74996FCD566AC30738B91609AAB78E07345D2DF03B3AB127EB31D41F3A548
TrID 49.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
31.8% (.EXE) Win64 Executable (generic) (10522/11/4)
6.1% (.EXE) OS/2 Executable (generic) (2029/13)
6.0% (.EXE) Generic Win/DOS Executable (2002/3)
6.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter KatzenTech
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
RU RU
Vendor Threat Intelligence
No detections
Malware family:
ID:
1
File name:
Dark Side.exe
Verdict:
Malicious activity
Analysis date:
2026-01-13 19:10:03 UTC
Tags:
pastebin miner winring0-sys vuln-driver upx xmrig

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
spawn virus
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-01-07T17:06:00Z UTC
Last seen:
2026-01-13T23:44:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Agent.rnd PDM:Trojan.Win32.Generic Trojan.Win32.Staser.eywi Trojan.Win32.Miner.sb RiskTool.Miner.UDP.C&C not-a-virus:RiskTool.Win64.XMRigMiner.a
Gathering data
Verdict:
Malicious
Threat:
Family.UNAMSILENTCRYPTOMINER
Threat name:
Win64.Trojan.MintZard
Status:
Malicious
First seen:
2026-01-08 00:23:13 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
29 of 38 (76.32%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig defense_evasion execution miner persistence upx
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
UPX packed file
Contacts third-party web service commonly abused for C2
Power Settings
Creates new service(s)
Executes dropped EXE
Stops running service(s)
Command and Scripting Interpreter: PowerShell
XMRig Miner payload
Xmrig family
xmrig
Unpacked files
SH256 hash:
5cff7e580d26fe455c988e3af21301d08c02581a99070c7998dcfb0e2aa26dbb
MD5 hash:
168c26b51ec5c7668acb53805e7d5a18
SHA1 hash:
25202b1fb226345caa3c822c7d8b9a4688eaacd1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:Windows_Generic_Threat_e8abb835
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments