Summary | ZeroBOX

Min1.exe

PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 14, 2023, 9:41 a.m. July 14, 2023, 9:50 a.m.
Size 9.8MB
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 6178b26f7cf49fbb0e917a965068edfb
SHA256 d904a2ebb1ba6f63f4a15ccc9d9583f184ea3014270e3158402de6692d2ba247
CRC32 468A8660
ssdeep 196608:Axc7ly85EMyysiZNde6jMXB3wsct1B8M0vaN:Axc7lyai7i5h9tH8M0yN
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
xmr.2miners.com 162.19.139.184
IP Address Status Action
162.19.139.184 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:59002 -> 164.124.101.2:53 2040353 ET COINMINER Observed DNS Query to Cryptocurrency Mining Pool Domain (xmr .2miners .com) Crypto Currency Mining Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.101:49163
162.19.139.184:12222
None None None

section {u'size_of_data': u'0x009a2200', u'virtual_address': u'0x00020000', u'entropy': 7.669448770345235, u'name': u'.data', u'virtual_size': u'0x009a21e0'} entropy 7.66944877035 description A section with a high entropy has been found
entropy 0.983990024938 description Overall entropy of this PE file is high
Lionic Trojan.Win32.Reflo.4!c
DrWeb Trojan.Siggen21.8331
MicroWorld-eScan Gen:Variant.Tedy.351054
FireEye Gen:Variant.Tedy.351054
ALYac Gen:Variant.Tedy.351054
Cylance unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005a508c1 )
Alibaba Trojan:Win64/Reflo.50f1f57a
K7GW Trojan ( 005a508c1 )
Cybereason malicious.64b38c
Arcabit Trojan.Tedy.D55B4E
Cyren W64/Injector.BMR.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/GenKryptik.GIIA
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win64.Reflo.pef
BitDefender Gen:Variant.Tedy.351054
Avast Win64:Evo-gen [Trj]
Tencent Win32.Trojan.FalseSign.Zimw
Sophos Mal/Generic-S
VIPRE Gen:Variant.Tedy.351054
TrendMicro TROJ_GEN.R002C0DGD23
McAfee-GW-Edition Artemis!Trojan
Emsisoft Gen:Variant.Tedy.351054 (B)
Webroot W32.Trojan.Gen
Avira TR/AD.Nekark.lyeqb
Gridinsoft Trojan.Win64.Gen.bot
Microsoft Trojan:Win32/Xmrig!ic
ZoneAlarm HEUR:Trojan.Win64.Reflo.pef
GData Gen:Variant.Tedy.351054
Google Detected
AhnLab-V3 Trojan/Win.Generic.R570073
McAfee Artemis!6178B26F7CF4
MAX malware (ai score=80)
Malwarebytes Crypt.Trojan.MSIL.DDS
Panda Trj/CI.A
TrendMicro-HouseCall TROJ_GEN.R002C0DGD23
Rising Trojan.Kryptik!8.8 (TFE:5:tSjl4DNY5BP)
Ikarus Trojan.Win64.Krypt
Fortinet W64/GenKryptik.GIIA!tr
AVG Win64:Evo-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_90% (W)