MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 18


Intelligence 18 IOCs YARA 38 File information Comments

SHA256 hash: 9194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9
SHA3-384 hash: d716ba15969350fde8815e25ec4692317d33224ab163a683ac53d44753a33f2a7175bba36135daa1545de3727096d380
SHA1 hash: 42df726156bee4a54ea328bd72a659602ab7d03e
MD5 hash: 5616a3471565d34d779b5b3d0520bb70
humanhash: mirror-india-virginia-maine
File name:Video.scr
Download: download sample
Signature CoinMiner
File size:6'227'159 bytes
First seen:2025-12-01 20:33:11 UTC
Last seen:2025-12-17 02:22:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 91ae93ed3ff0d6f8a4f22d2edd30a58e (49 x CoinMiner)
ssdeep 98304:RLbSThOfTCiFBXmfFs+JhEpCVoR8oMEOJ6Ty3RvX+UGD823FUuzmH:tBfTCiUs0VSLOJgyBGUA8Ch8
TLSH T151563345F4809837F139153629F980F2B07DBC7297244BDBA35E2AA56E317D83239A4E
TrID 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
24.6% (.EXE) Win64 Executable (generic) (10522/11/4)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter juroots
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
71
Origin country :
IL IL
Vendor Threat Intelligence
Malware configuration found for:
PyInstaller
Details
PyInstaller
a compiled assembly and a Python version
Malware family:
ID:
1
File name:
Photo.scr
Verdict:
Malicious activity
Analysis date:
2025-05-28 05:30:17 UTC
Tags:
bittorrent mozi botnet ftp pyinstaller upx xmrig

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
xmrig lien
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Restart of the analyzed sample
Running batch commands
Creating a process with a hidden window
Creating a file
Creating a process from a recently created file
Creating a service
Launching a service
Creating a file in the Windows subdirectories
Searching for synchronization primitives
Launching cmd.exe command interpreter
DNS request
Sending a UDP request
Сreating synchronization primitives
Connection attempt
Sending a custom TCP request
Enabling autorun for a service
Launching the process to change the firewall settings
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm coinminer compiled-script crypren installer-heuristic masquerade microsoft_visual_cc miner mozi overlay overlay packed packed packed packed pup pyinstaller pyinstaller python xmrig
Verdict:
Adware
File Type:
exe x32
First seen:
2019-07-31T04:26:00Z UTC
Last seen:
2025-12-03T18:26:00Z UTC
Hits:
~100000
Verdict:
inconclusive
YARA:
6 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Crytes
Status:
Malicious
First seen:
2019-08-24 14:31:40 UTC
File Type:
PE (Exe)
Extracted files:
289
AV detection:
33 of 36 (91.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig defense_evasion discovery miner persistence privilege_escalation pyinstaller upx
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
UPX packed file
ACProtect 1.3x - 1.4x DLL software
Executes dropped EXE
Loads dropped DLL
Boot or Logon Autostart Execution: Port Monitors
Contacts a large (1325) amount of remote hosts
Modifies Windows Firewall
Creates a large amount of network flows
XMRig Miner payload
Xmrig family
xmrig
Verdict:
Malicious
Tags:
Win.Malware.F857af-9776823-0
YARA:
n/a
Unpacked files
SH256 hash:
9194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9
MD5 hash:
5616a3471565d34d779b5b3d0520bb70
SHA1 hash:
42df726156bee4a54ea328bd72a659602ab7d03e
Detections:
PyInstaller
SH256 hash:
e82510adc44c4ea1fb0f22b1c3550d0a0152061e7489e5fbcf51952a55c8a4ce
MD5 hash:
a42c81a1edeeeed6a24de8b8cbeaf8f4
SHA1 hash:
7e904cfe7765a947e93a72d05354abdefbcba84c
SH256 hash:
05508fcece26d5de9205fab70af8e81297b145e5d8a812f03df1136de49dcd8a
MD5 hash:
808c7ba93a495d70a840680e852a2db3
SHA1 hash:
ea6a20629abd748613e2cc8f9897b568ae696639
Detections:
XMRig PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20 MAL_XMR_Miner_May19_1 XMRIG_Monero_Miner
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MAL_packer_lb_was_detected
Author:0x0d4y
Description:Detect the packer used by Lockbit4.0
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:PE_File_pyinstaller
Author:Didier Stevens (https://DidierStevens.com)
Description:Detect PE file produced by pyinstaller
Reference:https://isc.sans.edu/diary/21057
Rule name:PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20
Author:Florian Roth (Nextron Systems)
Description:Detects XMRIG crypto coin miners
Reference:https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
Rule name:PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20_RID33BA
Author:Florian Roth
Description:Detects XMRIG crypto coin miners
Reference:https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPXProtectorv10x2
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
Rule name:XMRIG_Miner
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases
Rule name:xmrig_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 9194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9

(this sample)

  
Delivery method
Distributed via web download

Comments