MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e96b3b7b28854acb8837084f6b3908b90eec159887054214b92ade6d14930608. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner.XMRig


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: e96b3b7b28854acb8837084f6b3908b90eec159887054214b92ade6d14930608
SHA3-384 hash: ac61beb266b2888788339c018688ba4d2badb22f8d826b97401fcb0a523169c7fbf7f9b51b09516b9198101f8b879685
SHA1 hash: eed08584786440ad3b5046ec70c7f7be5fb50852
MD5 hash: 11a7cbbb33dbafc6316a1f28c28d9d2b
humanhash: video-bulldog-robin-oven
File name:SecuriteInfo.com.FileRepMalwareMisc.12647.24907
Download: download sample
Signature CoinMiner.XMRig
File size:3'296'712 bytes
First seen:2022-03-23 09:13:40 UTC
Last seen:2022-03-25 06:57:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4e4095a0d90406c8428c5d9a9c6b05b7 (26 x CoinMiner, 4 x CoinMiner.XMRig)
ssdeep 98304:qiJw7RtHi6tyB2IzIVUhdqH2/A4oS8REAyM:b4sbXcVI+q2SsEHM
Threatray 39 similar samples on MalwareBazaar
TLSH T1ABE502FA62443398C45ACC345433FD45F2F6511E1BE9D6AE79CB7AC03FAA800D916B4A
Reporter SecuriteInfoCom
Tags:CoinMiner.XMRig exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
139
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Launching a process
Creating a process with a hidden window
DNS request
Searching for synchronization primitives
Sending an HTTP GET request
Connecting to a cryptocurrency mining pool
Sending a custom TCP request
Creating a service
Launching a service
Loading a system driver
Blocking the Windows Defender launch
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
Phoenix Miner Xmrig
Detection:
malicious
Classification:
evad.mine
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win64.Ransomware.Foreign
Status:
Malicious
First seen:
2022-03-23 08:22:58 UTC
File Type:
PE+ (Exe)
AV detection:
21 of 42 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence trojan upx
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Downloads MZ/PE file
UPX packed file
Modifies Windows Defender Real-time Protection settings
Unpacked files
SH256 hash:
e96b3b7b28854acb8837084f6b3908b90eec159887054214b92ade6d14930608
MD5 hash:
11a7cbbb33dbafc6316a1f28c28d9d2b
SHA1 hash:
eed08584786440ad3b5046ec70c7f7be5fb50852
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner.XMRig

Executable exe e96b3b7b28854acb8837084f6b3908b90eec159887054214b92ade6d14930608

(this sample)

  
Delivery method
Distributed via web download

Comments