MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 944b430ea906d74d8d8a8d2d487696f48e5d427e3ae8ee493dddebb3660ae766. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 944b430ea906d74d8d8a8d2d487696f48e5d427e3ae8ee493dddebb3660ae766
SHA3-384 hash: 39f6300d44ef0dc900b8ceac32cf993abe45fa109c8119f82952ea90e58e6c68a9eeeff1209e6a495d6572c158bcf9be
SHA1 hash: 98d818582766fef6f8bea7e3caf5882b963ef7a4
MD5 hash: e1e9d174eea2863be070d12f10b1eaae
humanhash: oregon-xray-nevada-golf
File name:e1e9d174eea2863be070d12f10b1eaae.exe
Download: download sample
Signature CoinMiner
File size:2'843'136 bytes
First seen:2022-02-03 14:46:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2a2a662be9dffc461398e7c94d0b55b4 (5 x GuLoader, 3 x CoinMiner, 3 x RedLineStealer)
ssdeep 49152:xQJuPSzoVeV3vXmIQZasaRXnTsFaDhBauVAbSvrl206H0ybh:4u63V3vXHQZaXRnRDyGAuTwvUybh
Threatray 486 similar samples on MalwareBazaar
TLSH T18BD522D2421B9365C7E515E4C2BA671B8CB8CC2EA707E631E605FE5796E002EDF30B58
Reporter abuse_ch
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
217
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Running batch commands
Creating a file
Creating a process from a recently created file
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
BitCoin Miner SilentXMRMiner Xmrig
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2022-02-01 16:23:14 UTC
File Type:
PE (Exe)
AV detection:
26 of 43 (60.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
944b430ea906d74d8d8a8d2d487696f48e5d427e3ae8ee493dddebb3660ae766
MD5 hash:
e1e9d174eea2863be070d12f10b1eaae
SHA1 hash:
98d818582766fef6f8bea7e3caf5882b963ef7a4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 944b430ea906d74d8d8a8d2d487696f48e5d427e3ae8ee493dddebb3660ae766

(this sample)

  
Delivery method
Distributed via web download

Comments