MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 67912a6766533a444eed4d57ff14466fd08f17db4f43659853429c776c817c90. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 67912a6766533a444eed4d57ff14466fd08f17db4f43659853429c776c817c90
SHA3-384 hash: e64cdddf9f133b53f3444bbcb640e40898ee2bcb3606577a10b386c5f9e22339aad239e068e4da5a589a3b4f60ddadc2
SHA1 hash: 38baaa4f0de3795157af8fb1146b2854a5908fa7
MD5 hash: fae1ddef6409b0316f1052c41f02e212
humanhash: virginia-lithium-illinois-xray
File name:InsightsBuildings.exe
Download: download sample
Signature CoinMiner
File size:2'180'533 bytes
First seen:2025-06-01 05:30:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bf95d1fc1d10de18b32654b123ad5e1f (327 x LummaStealer, 65 x Rhadamanthys, 25 x Vidar)
ssdeep 49152:FegTPGb+3sMd+ZCklncvH7+vbVKY6fjtj+SLMBc4yD469K9:F/OMs4kJU+vbIRjxfMlyV9K9
TLSH T1E9A53343C9E0EC5BE7674DB13CC8D13AEF77670118D18387637AC6673BA12C2A46A1A5
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 37e9e8686868e8e8 (1 x CoinMiner)
Reporter skocherhan
Tags:CoinMiner exe nikalopoto-com opendir


Avatar
skocherhan
https://nikalopoto.com/mine/InsightsBuildings.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
435
Origin country :
GB GB
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
InsightsBuildings.exe
Verdict:
Malicious activity
Analysis date:
2025-06-01 05:31:09 UTC
Tags:
autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
DNS request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
blackhole installer invalid-signature microsoft_visual_cc overlay overlay packed packed packer_detected signed
Result
Threat name:
Detection:
malicious
Classification:
rans.adwa.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Drops PE files with a suspicious file extension
Found direct / indirect Syscall (likely to bypass EDR)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Mutes Antivirus updates and installments via hosts file black listing
Powershell drops PE file
Sample is not signed and drops a device driver
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Search for Antivirus process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses powercfg.exe to modify the power settings
Writes many files with high entropy
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1703175 Sample: InsightsBuildings.exe Startdate: 01/06/2025 Architecture: WINDOWS Score: 100 125 baiSDqCVbDCtaCjYsnHnuMA.baiSDqCVbDCtaCjYsnHnuMA 2->125 127 raw.githubusercontent.com 2->127 129 pool.hashvault.pro 2->129 143 Malicious sample detected (through community Yara rule) 2->143 145 Antivirus detection for dropped file 2->145 147 Multi AV Scanner detection for dropped file 2->147 149 11 other signatures 2->149 12 InsightsBuildings.exe 37 2->12         started        16 Antimalware Core Executable.exe 2->16         started        18 AplicationFrameHost.exe 2->18         started        signatures3 process4 file5 115 C:\Users\user\AppData\Local\Temp\Xerox.vsdx, data 12->115 dropped 117 C:\Users\user\AppData\Local\Temp\Tops.vsdx, data 12->117 dropped 119 C:\Users\user\AppData\...\Textbooks.vsdx, data 12->119 dropped 121 16 other malicious files 12->121 dropped 177 Writes many files with high entropy 12->177 20 cmd.exe 4 12->20         started        179 Adds a directory exclusion to Windows Defender 16->179 181 Modifies power options to not sleep / hibernate 16->181 24 powershell.exe 16->24         started        26 powershell.exe 16->26         started        28 powershell.exe 16->28         started        30 6 other processes 16->30 signatures6 process7 file8 109 C:\Users\user\AppData\Local\...\Amended.com, PE32+ 20->109 dropped 159 Drops PE files with a suspicious file extension 20->159 161 Writes many files with high entropy 20->161 32 Amended.com 20->32         started        35 cmd.exe 2 20->35         started        38 extrac32.exe 21 20->38         started        48 7 other processes 20->48 163 Loading BitLocker PowerShell Module 24->163 40 conhost.exe 24->40         started        42 conhost.exe 26->42         started        44 conhost.exe 28->44         started        46 conhost.exe 30->46         started        50 4 other processes 30->50 signatures9 process10 file11 135 Modifies the context of a thread in another process (thread injection) 32->135 137 Adds a directory exclusion to Windows Defender 32->137 139 Injects a PE file into a foreign processes 32->139 141 Found direct / indirect Syscall (likely to bypass EDR) 32->141 52 Amended.com 2 32->52         started        105 C:\Users\user\AppData\Local\Temp\350424\J, data 35->105 dropped 107 C:\Users\user\AppData\Local\...\Introduction, DOS 38->107 dropped signatures12 process13 signatures14 157 Adds a directory exclusion to Windows Defender 52->157 55 Antimalware Core Executable.exe 52->55         started        59 curl.exe 52->59         started        62 powershell.exe 23 52->62         started        64 powershell.exe 52->64         started        process15 dnsIp16 111 C:\Windows\System32\drivers\etc\hosts, ASCII 55->111 dropped 165 Modifies the hosts file 55->165 167 Adds a directory exclusion to Windows Defender 55->167 169 Modifies power options to not sleep / hibernate 55->169 66 powershell.exe 55->66         started        70 powershell.exe 55->70         started        72 powershell.exe 55->72         started        80 11 other processes 55->80 131 127.0.0.1 unknown unknown 59->131 133 raw.githubusercontent.com 185.199.109.133, 443, 49726, 49729 FASTLYUS Netherlands 59->133 113 C:\...\AntimalwareCoreExecutable.exe, PE32+ 59->113 dropped 171 Writes many files with high entropy 59->171 74 conhost.exe 59->74         started        173 Loading BitLocker PowerShell Module 62->173 175 Powershell drops PE file 62->175 76 conhost.exe 62->76         started        78 conhost.exe 64->78         started        file17 signatures18 process19 dnsIp20 97 C:\ProgramData\SystemX64\...\xmrig.exe, PE32+ 66->97 dropped 99 C:\ProgramData\SystemX64\...\WinRing0x64.sys, PE32+ 66->99 dropped 151 Sample is not signed and drops a device driver 66->151 153 Loading BitLocker PowerShell Module 66->153 83 conhost.exe 66->83         started        85 conhost.exe 70->85         started        87 conhost.exe 72->87         started        123 185.199.108.133, 443, 49732, 49735 FASTLYUS Netherlands 80->123 101 C:\ProgramData\...\AplicationFrameHost.exe, PE32+ 80->101 dropped 103 C:\ProgramData\SystemX64\xmr.zip, Zip 80->103 dropped 155 Multi AV Scanner detection for dropped file 80->155 89 conhost.exe 80->89         started        91 conhost.exe 80->91         started        93 conhost.exe 80->93         started        95 7 other processes 80->95 file21 signatures22 process23
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-05-31 14:32:00 UTC
File Type:
PE (Exe)
Extracted files:
32
AV detection:
15 of 37 (40.54%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig defense_evasion discovery execution miner persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Power Settings
Checks computer location settings
Executes dropped EXE
Blocks application from running via registry modification
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Drops file in Drivers directory
XMRig Miner payload
Xmrig family
xmrig
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
67912a6766533a444eed4d57ff14466fd08f17db4f43659853429c776c817c90
MD5 hash:
fae1ddef6409b0316f1052c41f02e212
SHA1 hash:
38baaa4f0de3795157af8fb1146b2854a5908fa7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDiskFreeSpaceW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::GetWindowsDirectoryW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments