MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c74a0dc8a8bcd0ecab2b7bff864a0e628b60d5269146027fa8f2bd0f2a4d0d3c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c74a0dc8a8bcd0ecab2b7bff864a0e628b60d5269146027fa8f2bd0f2a4d0d3c
SHA3-384 hash: cc7855ab481a1df0c8bdcb9e0da4567d62abd3b0d1152c944eb75d6db323ffab15e28a44e17ae7c2ea33ba967a5a51cc
SHA1 hash: e2a48df5b83710daf25f6593e706ddf55301cf8d
MD5 hash: 5dc4e3e350d5baa66c14fc48437b599f
humanhash: hydrogen-one-potato-sad
File name:c74a0dc8a8bcd0ecab2b7bff864a0e628b60d5269146027fa8f2bd0f2a4d0d3c
Download: download sample
File size:1'657'151 bytes
First seen:2020-11-07 19:30:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e4290fa6afc89d56616f34ebbd0b1f2c (50 x CoinMiner)
ssdeep 49152:Lz071uv4BpMkibTIA5sf6r+WVc2HhG82SYMN:NABu
Threatray 106 similar samples on MalwareBazaar
TLSH C27533169E0A9D3FDAFC55BC3C3E1E2B46C0CB5140058570E2D7258B5A8CBBC2E6F95A
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Launching a process
Creating a process from a recently created file
Creating a window
Threat name:
Win64.Trojan.CoinMiner
Status:
Malicious
First seen:
2020-11-07 19:39:46 UTC
AV detection:
31 of 48 (64.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Drops file in Windows directory
Loads dropped DLL
Executes dropped EXE
UPX packed file
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments