MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9a2476c6474745cfacee35d15a3d4034d8d254304be3fa17a170ec0af9f9077e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 16


Intelligence 16 IOCs YARA 8 File information Comments

SHA256 hash: 9a2476c6474745cfacee35d15a3d4034d8d254304be3fa17a170ec0af9f9077e
SHA3-384 hash: bbb113c64cf639648e3b6ffd591d1f9ba87a6b78f5ee2c139526c4b4434c865b32650bd630e504aa6bab57b881c152a0
SHA1 hash: ad8cd2b9b0cbbc56228362a97d80ad1cd6c7739c
MD5 hash: 84770c1ace94c4dcd1e573556e3ea4fa
humanhash: mars-quebec-comet-foxtrot
File name:file
Download: download sample
Signature CoinMiner
File size:3'223'720 bytes
First seen:2026-02-04 10:54:19 UTC
Last seen:2026-02-04 10:59:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7e0a0e8f80bbd1a9c0078e57256f1c3d (5 x GCleaner, 4 x CoinMiner, 4 x LummaStealer)
ssdeep 49152:8DojF4Sjrsk5kLj9Zn6Ym9WvUJ+R7G+K+zsR12/PVK5XQeIG+I6:80qZpvUJSG+Kac2/9K5Aga
TLSH T1EDE5230AE7E804F8E0B7E27889634A46E3767C5A1371E78F07A465561F23690DE3E721
TrID 92.4% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10522/11/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.7% (.EXE) OS/2 Executable (generic) (2029/13)
0.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:CoinMiner dropped-by-amadey exe fbf543


Avatar
Bitsight
url: http://130.12.180.43/files/5298241443/SXgRkM1.exe

Intelligence


File Origin
# of uploads :
7
# of downloads :
136
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
Archives
Details
Archives
SFX commands and extracted archive contents
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2026-02-04 10:56:07 UTC
Tags:
miner winring0-sys vuln-driver auto-startup xmrig

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun xmrig
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 byovd crypto expired-cert fingerprint fingerprint installer installer installer-heuristic microsoft_visual_cc miner monero overlay sfx xmrig
Result
Gathering data
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan.Win32.Reconyc.sb Trojan.Win32.Miner.sb Trojan.Win32.Agent.sb HEUR:Trojan.Win32.Miner.gen not-a-virus:RiskTool.Win64.XMRigMiner.a not-a-virus:HEUR:RiskTool.Win32.BitMiner.gen
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.13 Win 64 Exe x64
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Checks computer location settings
Drops startup file
Executes dropped EXE
XMRig Miner payload
Xmrig family
xmrig
Unpacked files
SH256 hash:
9a2476c6474745cfacee35d15a3d4034d8d254304be3fa17a170ec0af9f9077e
MD5 hash:
84770c1ace94c4dcd1e573556e3ea4fa
SHA1 hash:
ad8cd2b9b0cbbc56228362a97d80ad1cd6c7739c
SH256 hash:
11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
MD5 hash:
0c0195c48b6b8582fa6f6373032118da
SHA1 hash:
d25340ae8e92a6d29f599fef426a2bc1b5217299
Detections:
PUA_VULN_Driver_Openlibsysorg_Winringsys_Winring_11BD
SH256 hash:
5b02bffbdc8665dc93c86602b8ede1c764e3cfe116190556cb58e631cc4dcdd7
MD5 hash:
2a7213268e54d17e30f6a0a3bbb26c27
SHA1 hash:
8713534759297ed4e49c178e3f39431bbacd073d
Detections:
XMRig MAL_XMR_Miner_May19_1 XMRIG_Monero_Miner MALWARE_Win_CoinMiner02
SH256 hash:
8a9af4c48c2d0f2a5517b8f88d49ce1ff64493d261487b049c7fac6024b6cb00
MD5 hash:
1880fff22de5224adf5a7b1117dd1e2d
SHA1 hash:
6148ccdab5a5777d12b0a4e9c6fe3d34209bf1a5
Detections:
INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Suspicious_Process
Author:Security Research Team
Description:Suspicious process creation

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 9a2476c6474745cfacee35d15a3d4034d8d254304be3fa17a170ec0af9f9077e

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments