MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f72cc34394c1d4ce63a6151c1effe973e44cc65043df34de98f82a127c6225d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 9


Intelligence 9 IOCs YARA 11 File information Comments

SHA256 hash: f72cc34394c1d4ce63a6151c1effe973e44cc65043df34de98f82a127c6225d1
SHA3-384 hash: 9357e93fc3b535c32e049bbbe8c7da9a6ebff5810ec45e733bbd57b1855eb1e657e7fd749e23a47d49da476c680b6768
SHA1 hash: 175edd3cff914f092f089ace0537d8bfdad377f2
MD5 hash: 96a7f708dc26987653bb55cf9ee7afdd
humanhash: berlin-quiet-fix-potato
File name:xmrig
Download: download sample
Signature CoinMiner
File size:8'895'728 bytes
First seen:2023-06-18 09:34:57 UTC
Last seen:2023-06-18 09:35:41 UTC
File type: elf
MIME type:application/x-executable
ssdeep 196608:MPYnvBnzA0RvEqrVc0FcjYEpD71TnfD1fl5T7s:MPYnvBnzA0RvESVcscjDRTn71flt
TLSH T1D4969E07F9A318FDC5DAC970472BD3A3BA30785842257A7B3694D9302E53FA05B2EB51
telfhash t12ac30a65082dc94bcc716a29aebd6e6647ca06cbb310fdd4afe4c01c9f40c9da2e754d
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter ULTRAFRAUD
Tags:CoinMiner elf XMRIG

Intelligence


File Origin
# of uploads :
2
# of downloads :
199
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
coinminer monero packed virus xmrig
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
true
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
84
Number of processes launched:
1
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
Anti-VM
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.mine
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains symbols with names commonly found in malware
Found strings related to Crypto-Mining
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Stdout / stderr contain strings indicative of a mining client
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
Threat name:
Linux.Trojan.Miner
Status:
Malicious
First seen:
2023-04-04 04:54:00 UTC
File Type:
ELF64 Little (Exe)
AV detection:
22 of 37 (59.46%)
Threat level:
  5/5
Result
Malware family:
xmrig_linux
Score:
  10/10
Tags:
family:xmrig family:xmrig_linux antivm linux miner
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Checks CPU configuration
Checks hardware identifiers (DMI)
Reads CPU attributes
Reads hardware information
xmrig
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:Linux_Cryptominer_Camelot_209b02dd
Author:Elastic Security
Rule name:Linux_Cryptominer_Camelot_cdd631c1
Author:Elastic Security
Rule name:Linux_Cryptominer_Xmrminer_67bf4b54
Author:Elastic Security
Rule name:Linux_Trojan_Pornoasset_927f314f
Author:Elastic Security
Rule name:MacOS_Cryptominer_Generic_333129b7
Author:Elastic Security
Rule name:MacOS_Cryptominer_Xmrig_241780a1
Author:Elastic Security
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

elf f72cc34394c1d4ce63a6151c1effe973e44cc65043df34de98f82a127c6225d1

(this sample)

  
Delivery method
Distributed via web download

Comments