MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f0eff94e8ed95c8ccb19decb14f7edcf036830502745ec47fd64152e8b6e42b9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 10


Intelligence 10 IOCs YARA 21 File information Comments

SHA256 hash: f0eff94e8ed95c8ccb19decb14f7edcf036830502745ec47fd64152e8b6e42b9
SHA3-384 hash: 6cdb204f12b7e09dfb5ad024c3ac06f114b7bb20b433f52c2a96b7ae731c88c6718d36efe832263692d1707d515ddc2b
SHA1 hash: a65671f28d52ea1730e671316a29b233f0fb0397
MD5 hash: 9ec6bc11dee711237f01c0124f9ca00c
humanhash: dakota-apart-seven-romeo
File name:caaservices.exe
Download: download sample
Signature CoinMiner
File size:40'272'384 bytes
First seen:2026-01-31 08:54:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7716121b91c589bad02078b163c20df1 (1 x CoinMiner)
ssdeep 786432:4l4ZJpuJOUgpC4ImWjEiO99uuhOzA6z9iP:pDpuJNUfNWWlOzpx
TLSH T1CD97E0000AB929B6D073877049FECD7199767C9A751CC09F1096FE9F3D72B029E2963A
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter Alex_sev
Tags:BitCoinMiner CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
123
Origin country :
BY BY
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
caaservices.exe
Verdict:
No threats detected
Analysis date:
2026-01-31 08:46:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug coinminer crypto fingerprint microsoft_visual_cc miner net obfuscated packed unsafe virus xor-pe
Verdict:
Adware
File Type:
exe x64
First seen:
2025-12-08T14:12:00Z UTC
Last seen:
2026-02-02T06:21:00Z UTC
Hits:
~10000
Detections:
BSS:Trojan.Win32.Generic not-a-virus:BSS:RiskTool.Win32.BitCoinMiner.ga
Gathering data
Verdict:
Malicious
Threat:
RiskTool.Win32.BitCoinMiner
Threat name:
Win64.Coinminer.Generic
Status:
Malicious
First seen:
2025-12-16 11:04:19 UTC
File Type:
PE+ (Exe)
Extracted files:
12
AV detection:
10 of 36 (27.78%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Jupyter_infostealer
Author:CD_R0M_
Description:Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022
Rule name:Lumma_Stealer_Detection
Author:ashizZz
Description:Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference:https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments