MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc24f4d37898468e34bee09afdcb7e1fc681ecbac667bc8eb3c62d035c0fd255. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 9


Intelligence 9 IOCs YARA 24 File information Comments

SHA256 hash: dc24f4d37898468e34bee09afdcb7e1fc681ecbac667bc8eb3c62d035c0fd255
SHA3-384 hash: 3486a103038a498ff33ea63513592c27924cc2dbad09260aff936c19b688927909437367e8c66911e85964db756ab388
SHA1 hash: c861dc457d57471ab42879f49cc8fe171e7c9b1c
MD5 hash: 95452958f42b1b93f0c887f59d84d19f
humanhash: winter-oregon-mango-mobile
File name:test1.zip
Download: download sample
Signature CoinMiner
File size:3'331'483 bytes
First seen:2023-12-10 09:12:21 UTC
Last seen:2023-12-10 09:27:21 UTC
File type: zip
MIME type:application/zip
ssdeep 98304:krB8+Mwef454VqqJ0qEIrhGB57GSI3Mm8fO0S:krBhMI4V3JJqGek
TLSH T18DF53396B1348C1AEEC47A1963A76F0387156B651A00A7BFFE00735ACB5B7DCDEC2214
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter Xev
Tags:CoinMiner CoinMiner.XMRig zip


Avatar
NIXLovesCooper
https://cdn.nest.rip/uploads/fe8c3030-34d2-4153-bdb3-f0ef0fdd51b2.zip

Intelligence


File Origin
# of uploads :
2
# of downloads :
114
Origin country :
GR GR
File Archive Information

This file archive contains 3 file(s), sorted by their relevance:

File name:xmrig.exe
File size:8'251'392 bytes
SHA256 hash: 9ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc
MD5 hash: 4813fa6d610e180b097eae0ce636d2aa
MIME type:application/x-dosexec
Signature CoinMiner
File name:WinRing0x64.sys
File size:14'544 bytes
SHA256 hash: 11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
MD5 hash: 0c0195c48b6b8582fa6f6373032118da
MIME type:application/x-dosexec
Signature CoinMiner
File name:start.cmd
File size:278 bytes
SHA256 hash: cd7f2c4251361d8e83bc1857767c6eb20d305605ca78418aca3af439ff7d41e2
MD5 hash: 080123b6eac4a332d3f2b11f6eb3aa54
MIME type:text/x-msdos-batch
Signature CoinMiner
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug coin coinminer crypto evasive expand greyware lolbin monero xmrig
Threat name:
Win64.Trojan.Clearfake
Status:
Malicious
First seen:
2023-10-23 18:44:47 UTC
File Type:
Binary (Archive)
Extracted files:
11
AV detection:
25 of 37 (67.57%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Check_OutputDebugStringA_iat
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Linux_Trojan_Pornoasset_927f314f
Author:Elastic Security
Rule name:MacOS_Cryptominer_Generic_333129b7
Author:Elastic Security
Rule name:MacOS_Cryptominer_Xmrig_241780a1
Author:Elastic Security
Rule name:MALWARE_Win_CoinMiner02
Author:ditekSHen
Description:Detects coinmining malware
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:rig_win64_xmrig_6_13_1_xmrig
Author:yarGen Rule Generator
Description:rig_win64 - file xmrig.exe
Reference:https://github.com/Neo23x0/yarGen
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases

File information


The table below shows additional information about this malware sample such as delivery method and external references.

CoinMiner

zip dc24f4d37898468e34bee09afdcb7e1fc681ecbac667bc8eb3c62d035c0fd255

(this sample)

Comments