MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 77af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 77af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9
SHA3-384 hash: a68216b3776d356a7d2db4af7a88389ae0bfcd176192d1bb3c6d816fdca947bfa62364f0474843cee71094bb7bded730
SHA1 hash: bcf5dc9253e785c561261ccefd3b0485adaa3748
MD5 hash: 4d9728a6c062cfa93ec0e5b18f67f436
humanhash: monkey-solar-lake-louisiana
File name:nixmixhix.exe
Download: download sample
Signature CoinMiner
File size:13'149'696 bytes
First seen:2025-04-05 12:28:11 UTC
Last seen:2025-04-17 00:05:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 203d63d5d9a088e2d84cef737227986b (55 x CoinMiner)
ssdeep 393216:FMMj6uIhwiF20XBou0GmG/pUTfNF88FH8vmg2b5:CgbIBF2IaCpUTfNF8qH8vLw5
TLSH T13DD6F18481DA4638B067CAE9AE09F12BFAD8F71E4BFD5044B8C793441C471BD8F199A7
TrID 49.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
31.8% (.EXE) Win64 Executable (generic) (10522/11/4)
6.1% (.EXE) OS/2 Executable (generic) (2029/13)
6.0% (.EXE) Generic Win/DOS Executable (2002/3)
6.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter aachum
Tags:CoinMiner exe


Avatar
iamaachum
https://github.com/Xform1Z121/rihuata/raw/refs/heads/main/nixmixhix.exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
61
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Adobe After Effects 2025 25.1.0.68 RePack by KpoJIuК.exe
Verdict:
Malicious activity
Analysis date:
2025-04-05 14:21:21 UTC
Tags:
github miner pastebin winring0x64-sys vuln-driver xor-url generic xmrig

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus crypt zusy
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for the window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug crypt zusy
Result
Threat name:
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Connects to a pastebin service (likely for C&C)
DNS related to crypt mining pools
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Stop EventLog
Sigma detected: Suspect Svchost Activity
Suricata IDS alerts for network traffic
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1657277 Sample: nixmixhix.exe Startdate: 05/04/2025 Architecture: WINDOWS Score: 100 40 xmr-eu1.nanopool.org 2->40 42 pastebin.com 2->42 50 Suricata IDS alerts for network traffic 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Multi AV Scanner detection for submitted file 2->54 60 3 other signatures 2->60 8 helper.exe 1 2->8         started        12 nixmixhix.exe 3 2->12         started        signatures3 56 DNS related to crypt mining pools 40->56 58 Connects to a pastebin service (likely for C&C) 42->58 process4 file5 36 C:\Windows\Temp\zsbtqejtndii.sys, PE32+ 8->36 dropped 62 Multi AV Scanner detection for dropped file 8->62 64 Writes to foreign memory regions 8->64 66 Modifies the context of a thread in another process (thread injection) 8->66 68 Sample is not signed and drops a device driver 8->68 14 svchost.exe 8->14         started        18 conhost.exe 8->18         started        38 C:\ProgramDatabehaviorgraphoogle\Chrome\helper.exe, PE32+ 12->38 dropped 20 sc.exe 1 12->20         started        22 sc.exe 1 12->22         started        24 sc.exe 1 12->24         started        26 sc.exe 1 12->26         started        signatures6 process7 dnsIp8 44 163.172.154.142, 10343, 49719 OnlineSASFR United Kingdom 14->44 46 51.89.23.91, 10343, 49717 OVHFR France 14->46 48 pastebin.com 104.22.68.199, 443, 49718 CLOUDFLARENETUS United States 14->48 70 Query firmware table information (likely to detect VMs) 14->70 28 conhost.exe 20->28         started        30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        signatures9 process10
Threat name:
Win64.Infostealer.Tinba
Status:
Malicious
First seen:
2025-04-01 00:25:53 UTC
File Type:
PE+ (Exe)
AV detection:
27 of 36 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig defense_evasion execution miner persistence
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Launches sc.exe
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Executes dropped EXE
Creates new service(s)
Stops running service(s)
XMRig Miner payload
Xmrig family
xmrig
Verdict:
Malicious
Tags:
Win.Trojan.Genkryptik-10016533-0
YARA:
n/a
Unpacked files
SH256 hash:
77af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9
MD5 hash:
4d9728a6c062cfa93ec0e5b18f67f436
SHA1 hash:
bcf5dc9253e785c561261ccefd3b0485adaa3748
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:HUNTING_SUSP_TLS_SECTION
Author:chaosphere
Description:Detect PE files with .tls section that can be used for anti-debugging
Reference:Practical Malware Analysis - Chapter 16
Rule name:pe_detect_tls_callbacks
Rule name:Windows_Generic_Threat_e8abb835
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 77af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments