MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 17


Intelligence 17 IOCs YARA 32 File information Comments

SHA256 hash: af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c
SHA3-384 hash: 30a49cbefb13c24efdecec6520dd9854d4c5f897f074cf896051a8cb739aa2ee9c8b0b154ea88b9ed84f174a6702d706
SHA1 hash: 7429f81064e044e981de12bde015117953b7b0e7
MD5 hash: a20727b81b50a20483ba59ae65443dfe
humanhash: minnesota-speaker-lemon-twelve
File name:Photo.scr
Download: download sample
Signature CoinMiner
File size:6'271'259 bytes
First seen:2025-03-07 16:48:53 UTC
Last seen:2025-09-26 08:31:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 91ae93ed3ff0d6f8a4f22d2edd30a58e (48 x CoinMiner)
ssdeep 98304:RLGSThOfTCiFBXmfFs+JMHpCVoR8oMEOJ6Ty3RvX+Y2naq8le+:YBfTCiUswVSLOJgyBG/aW+
Threatray 5 similar samples on MalwareBazaar
TLSH T167563362F440E436E038203925F684A6B17DFD7347254A8B73A93A364D793D836BDB4E
TrID 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
24.6% (.EXE) Win64 Executable (generic) (10522/11/4)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon 7c70747474d67274 (47 x CoinMiner)
Reporter aachum
Tags:CoinMiner exe PhoMiner


Avatar
iamaachum
http://112.252.241.115:8888/Photo.scr

Intelligence


File Origin
# of uploads :
6
# of downloads :
331
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Photo.scr
Verdict:
Malicious activity
Analysis date:
2025-02-09 18:17:47 UTC
Tags:
bittorrent mozi botnet ftp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
xmrig lien
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Restart of the analyzed sample
Running batch commands
Creating a process with a hidden window
Creating a file
Creating a process from a recently created file
Creating a service
Launching a service
Creating a file in the Windows subdirectories
Searching for synchronization primitives
DNS request
Sending a UDP request
Сreating synchronization primitives
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Connecting to a non-recommended domain
Enabling autorun for a service
Launching the process to change the firewall settings
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Creates files with lurking names (e.g. Crack.exe)
Drops PE files to the user root directory
Found API chain indicative of debugger detection
Machine Learning detection for sample
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses netsh to modify the Windows network and firewall settings
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 742877 Sample: AV.scr Startdate: 10/11/2022 Architecture: WINDOWS Score: 100 113 xmr.crypto-pool.fr 2->113 115 router.utorrent.com 2->115 117 4 other IPs or domains 2->117 139 Snort IDS alert for network traffic 2->139 141 Antivirus detection for dropped file 2->141 143 Antivirus / Scanner detection for submitted sample 2->143 145 4 other signatures 2->145 10 AV.scr 35 2->10         started        14 HelpPane.exe 34 2->14         started        16 svchost.exe 2->16         started        18 7 other processes 2->18 signatures3 process4 file5 81 C:\Users\user\AppData\Local\...\xmrig.exe, PE32 10->81 dropped 83 C:\Users\user\AppData\...\win32service.pyd, PE32 10->83 dropped 85 C:\Users\user\AppData\...\win32evtlog.pyd, PE32 10->85 dropped 93 24 other files (23 malicious) 10->93 dropped 147 Found API chain indicative of debugger detection 10->147 149 Contains functionality to infect the boot sector 10->149 151 Creates files with lurking names (e.g. Crack.exe) 10->151 20 AV.scr 10->20         started        87 C:\Windows\Temp\_MEI47842\xmrig.exe, PE32 14->87 dropped 89 C:\Windows\Temp\_MEI47842\win32service.pyd, PE32 14->89 dropped 91 C:\Windows\Temp\_MEI47842\win32evtlog.pyd, PE32 14->91 dropped 95 23 other files (22 malicious) 14->95 dropped 22 HelpPane.exe 2 14->22         started        153 Changes security center settings (notifications, updates, antivirus, firewall) 16->153 26 MpCmdRun.exe 16->26         started        signatures6 process7 dnsIp8 28 cmd.exe 1 20->28         started        30 cmd.exe 1 20->30         started        32 cmd.exe 3 20->32         started        121 137.208.28.12 WirtschaftsuniversitaetWienAT Austria 22->121 123 128.127.166.189 VOF-ASES Spain 22->123 125 103 other IPs or domains 22->125 79 C:\Windows\Temp\config, ASCII 22->79 dropped 36 xmrig.exe 22->36         started        39 cmd.exe 22->39         started        41 cmd.exe 22->41         started        45 2 other processes 22->45 43 conhost.exe 26->43         started        file9 process10 dnsIp11 47 HelpPane.exe 35 28->47         started        51 conhost.exe 28->51         started        53 HelpPane.exe 35 30->53         started        55 conhost.exe 30->55         started        71 C:\Users\user\HelpPane.exe, PE32 32->71 dropped 73 C:\Users\user\HelpPane.exe:Zone.Identifier, ASCII 32->73 dropped 135 Drops PE files to the user root directory 32->135 57 conhost.exe 32->57         started        119 xmr.crypto-pool.fr 36->119 137 Multi AV Scanner detection for dropped file 36->137 59 conhost.exe 36->59         started        75 C:\Windows\Temp\xmrig.exe, PE32 39->75 dropped 61 conhost.exe 39->61         started        77 C:\Windows\Temp\config.json, JSON 41->77 dropped 63 conhost.exe 41->63         started        65 3 other processes 45->65 file12 signatures13 process14 file15 97 C:\Users\user\AppData\Local\...\xmrig.exe, PE32 47->97 dropped 99 C:\Users\user\AppData\...\win32service.pyd, PE32 47->99 dropped 101 C:\Users\user\AppData\...\win32evtlog.pyd, PE32 47->101 dropped 109 24 other files (23 malicious) 47->109 dropped 127 Multi AV Scanner detection for dropped file 47->127 129 Creates files with lurking names (e.g. Crack.exe) 47->129 131 Uses netsh to modify the Windows network and firewall settings 47->131 133 Modifies the windows firewall 47->133 67 HelpPane.exe 1 47->67         started        103 C:\Users\user\AppData\Local\...\xmrig.exe, PE32 53->103 dropped 105 C:\Users\user\AppData\...\win32service.pyd, PE32 53->105 dropped 107 C:\Users\user\AppData\...\win32evtlog.pyd, PE32 53->107 dropped 111 24 other files (23 malicious) 53->111 dropped 69 HelpPane.exe 53->69         started        signatures16 process17
Threat name:
Win32.Exploit.Phominer
Status:
Malicious
First seen:
2019-07-26 04:53:09 UTC
File Type:
PE (Exe)
Extracted files:
289
AV detection:
36 of 38 (94.74%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig defense_evasion discovery miner persistence privilege_escalation pyinstaller upx
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
UPX packed file
ACProtect 1.3x - 1.4x DLL software
Executes dropped EXE
Loads dropped DLL
Boot or Logon Autostart Execution: Port Monitors
Modifies Windows Firewall
Contacts a large (5034) amount of remote hosts
Creates a large amount of network flows
XMRig Miner payload
Xmrig family
xmrig
Verdict:
Malicious
Tags:
Win.Malware.Coinminer-9776647-0
YARA:
n/a
Unpacked files
SH256 hash:
af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c
MD5 hash:
a20727b81b50a20483ba59ae65443dfe
SHA1 hash:
7429f81064e044e981de12bde015117953b7b0e7
Detections:
PyInstaller
SH256 hash:
7a74da389fbd10a710c294c2e914dc6f18e05f028f07958a2fa53ac44f0e4b90
MD5 hash:
d34a527493f39af4491b3e909dc697ca
SHA1 hash:
afee32fcd9ce160680371357a072f58c5f790d48
SH256 hash:
e82510adc44c4ea1fb0f22b1c3550d0a0152061e7489e5fbcf51952a55c8a4ce
MD5 hash:
a42c81a1edeeeed6a24de8b8cbeaf8f4
SHA1 hash:
7e904cfe7765a947e93a72d05354abdefbcba84c
SH256 hash:
05508fcece26d5de9205fab70af8e81297b145e5d8a812f03df1136de49dcd8a
MD5 hash:
808c7ba93a495d70a840680e852a2db3
SHA1 hash:
ea6a20629abd748613e2cc8f9897b568ae696639
Detections:
XMRig PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20 MAL_XMR_Miner_May19_1 XMRIG_Monero_Miner
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MAL_packer_lb_was_detected
Author:0x0d4y
Description:Detect the packer used by Lockbit4.0
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:PE_File_pyinstaller
Author:Didier Stevens (https://DidierStevens.com)
Description:Detect PE file produced by pyinstaller
Reference:https://isc.sans.edu/diary/21057
Rule name:PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20
Author:Florian Roth (Nextron Systems)
Description:Detects XMRIG crypto coin miners
Reference:https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
Rule name:PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20_RID33BA
Author:Florian Roth
Description:Detects XMRIG crypto coin miners
Reference:https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPXProtectorv10x2
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
Rule name:XMRIG_Miner
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases
Rule name:xmrig_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetDriveTypeW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::RemoveDirectoryW
KERNEL32.dll::SetDllDirectoryW

Comments