MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b980de9084772a7118bf5f3c202edbc6593fd17530b288f44e37ac22403f27af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b980de9084772a7118bf5f3c202edbc6593fd17530b288f44e37ac22403f27af
SHA3-384 hash: a9b8a755e0bfc81b677c73cc37f406e3cd41fc6538a2a38003331b79e17bb7f7cbdb459441ae592be704f5031a503b36
SHA1 hash: 7a118e590db3f6e1f80e815b23a2aa2fd393db9b
MD5 hash: 2e4cd1e56e4cc2429eec11ca597e37ea
humanhash: three-sweet-eighteen-ack
File name:b980de9084772a7118bf5f3c202edbc6593fd17530b288f44e37ac22403f27af
Download: download sample
File size:2'018'442 bytes
First seen:2020-11-07 19:31:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e4290fa6afc89d56616f34ebbd0b1f2c (50 x CoinMiner)
ssdeep 49152:Lz071uv4B9MkibTIA5KIP7nTrmBhihM5xC+UX:NABu
Threatray 108 similar samples on MalwareBazaar
TLSH 279523015E3A5D3EDAFC203C186E0F1A92D1CA100444EFB196DB2DCB5B9DF6D396762A
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the Windows subdirectories
Launching a process
Creating a process from a recently created file
Connection attempt
Creating a window
Threat name:
Win64.Trojan.CoinMiner
Status:
Malicious
First seen:
2020-11-07 19:39:37 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Drops file in Windows directory
Loads dropped DLL
Executes dropped EXE
UPX packed file
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments