MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a1ce7981617497fe17c998698146437831520e9ab4dd5c454097ccf061f093e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: 7a1ce7981617497fe17c998698146437831520e9ab4dd5c454097ccf061f093e
SHA3-384 hash: 413e9726f9a6c66326e6b1030e7629125a8fde6c39351529777141a00bd2085d90ffccaa772203bb1115cbc5c7e7e3e4
SHA1 hash: 49e500ebbb278a25722de0581d8b1f8932dcab9a
MD5 hash: 0f36a9c83892d83df94b8e8ca0fb77fb
humanhash: cup-high-oscar-saturn
File name:smNoGPU.malware
Download: download sample
Signature CoinMiner
File size:5'738'496 bytes
First seen:2025-11-14 01:02:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 84364258335aa120aa66630a9ee645bf (4 x CoinMiner)
ssdeep 98304:/SPDHaHlqK+RLADEzgkKoi/FUl4XcPx0sJkI2eCGhP1KihWbxbi3cYi:/SPraFqKa4RFlMPG2CGRg9e3cY
Threatray 13 similar samples on MalwareBazaar
TLSH T19646D07BC21B4F9799BD2FBC934B5DBA72354060AD0BB23A9B7108F4D93994141AF348
TrID 41.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
26.1% (.EXE) Win64 Executable (generic) (10522/11/4)
12.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.1% (.ICL) Windows Icons Library (generic) (2059/9)
5.0% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter XiAnzheng
Tags:CoinMiner exe miner Monero

Intelligence


File Origin
# of uploads :
1
# of downloads :
142
Origin country :
ID ID
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
smNoGPU.malware
Verdict:
Malicious activity
Analysis date:
2025-11-14 01:03:57 UTC
Tags:
anti-evasion auto-sch-xml miner winring0-sys vuln-driver xmrig

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
backdoor spawn crypt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Launching a process
Creating a file in the %temp% directory
Deleting a recently created file
Creating a file in the Program Files subdirectories
Creating a process from a recently created file
Creating a file in the Windows subdirectories
Replacing files
DNS request
Searching for synchronization primitives
Connecting to a cryptocurrency mining pool
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug coinminer crypt packed rozena unsafe
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-10-27T11:01:00Z UTC
Last seen:
2025-11-14T00:52:00Z UTC
Hits:
~100
Detections:
Trojan.Win32.Agent.xcaovi Trojan.Win32.Agent.sb HEUR:Trojan.Win32.Miner.gen Trojan.Win64.SilentCryptoMiner.abc Trojan.Win32.Inject.sb not-a-virus:RiskTool.Win32.BitCoinMiner.sb RiskTool.Miner.UDP.C&C RiskTool.BitCoinMiner.UDP.C&C not-a-virus:HEUR:RiskTool.Win32.BitMiner.gen
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Rozena
Status:
Malicious
First seen:
2025-10-27 16:43:38 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig execution miner persistence
Behaviour
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Drops file in Program Files directory
Suspicious use of SetThreadContext
Power Settings
Executes dropped EXE
XMRig Miner payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Xmrig family
xmrig
Verdict:
Malicious
Tags:
Win.Malware.Tedy-10039946-0
YARA:
n/a
Unpacked files
SH256 hash:
7a1ce7981617497fe17c998698146437831520e9ab4dd5c454097ccf061f093e
MD5 hash:
0f36a9c83892d83df94b8e8ca0fb77fb
SHA1 hash:
49e500ebbb278a25722de0581d8b1f8932dcab9a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

CoinMiner

Executable exe 7a1ce7981617497fe17c998698146437831520e9ab4dd5c454097ccf061f093e

(this sample)

Comments