Threat Database Trojans Trojan.Coinminer.GCE

Trojan.Coinminer.GCE

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 6,654
Threat Level: 80 % (High)
Infected Computers: 4,897
First Seen: August 31, 2021
Last Seen: March 15, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Coinminer.GCE
Signature status: No Signature

Known Samples

MD5: 17bdfc45f5a581ac7c9ed238dd974024
SHA1: 79d513764556d9a636f335e19dd301d0e3c90103
SHA256: F30A544A8C8488193A413715EA03C8E46B31668EA392BD818FE47D6015488E06
File Size: 3.04 MB, 3036768 bytes
MD5: 85f1a5840467be3fc03277e1944f4a2f
SHA1: 6de4eca8bc9fa4bbb83d90e099087ec455a28634
SHA256: 3E6BA0C9CDF4DCC9A6ACF6EE1378F01D0441332B43F4CCB69C13F24E956954CA
File Size: 2.21 MB, 2209792 bytes
MD5: 046696eb8755c55584ee79c58519bade
SHA1: d8e1d7d60f2fbb6a69beae17bd469b0e87c5a63f
SHA256: 75A34F6AAACD13CE4483F71CF27AA8331149D2C5C581EA6E407A06251960013B
File Size: 2.21 MB, 2209792 bytes
MD5: bb9c780d72b779e6b057743c58960ba1
SHA1: 16781c539553da902802fe5190053e594fa5f374
SHA256: 26CE051A69CBF092EBE0AF0129229A8658CE7B83D73077A775DC2B610BD2DED2
File Size: 2.21 MB, 2209792 bytes
MD5: b7725050baa62373aca2893dbdd79a8b
SHA1: 99e7e45fbf091c9459f71ad8a9ba7eb90874aae5
SHA256: D7B36848A423F1B79B137934A9F0A12B3D521C80F0B8BEB3293ABD143947ADF4
File Size: 2.21 MB, 2209792 bytes
Show More
MD5: 0d474f40a8c1ccd7db630ee52c86b009
SHA1: 9dcad50444bec91f4c271fb46169c74a1fe74023
SHA256: A3B0EF0D6EEEE41B70D69EB843A3F5CE1794BDEFBEE1C25997272319CAD3A30F
File Size: 2.21 MB, 2209280 bytes
MD5: 107352e0d221e654a73e2f2708f5c2d2
SHA1: 7355f11d779e0c42bcb2dbc79c9ea510df33738c
SHA256: 83E393103B5960B6D139F3FF8306B83E5190E43D53C12713D91AF746438D16FF
File Size: 2.23 MB, 2230272 bytes
MD5: 19492dbf8183cf5d525ec71066eb878b
SHA1: b722899696a022d887227cd3e1a2c38a4573aa3b
SHA256: 998036CFC1D3FD3D03CABD89E048704167E0787C141A9DFA6549B8575B5BA427
File Size: 1.67 MB, 1669008 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name
  • Microsoft Corporation
  • YANDEX LLC
Company Short Name
  • Microsoft
  • YANDEX LLC
File Description
  • Microsoft Edge
  • Yandex
File Version
  • 92.0.902.67
  • 91.0.864.70
  • 21.11.2.538
Internal Name
  • @INTERNAL_NAME@
  • elevation_service_exe
Last Change
  • 8c35a0dac4b4b883e519423b1d775b232426761b
  • 593292d4cc4d7792034deb486ed0e3df5c7a2f4c
  • eda2f229828b8182304335674621190ceba97ecd
Legal Copyright
  • Copyright (c) 2012-2021 YANDEX LLC. All Rights Reserved.
  • Copyright Microsoft Corporation. All rights reserved.
Official Build 1
Original Filename elevation_service.exe
Product Name
  • Microsoft Edge
  • Yandex
Product Short Name
  • Microsoft Edge
  • Yandex
Product Version
  • 92.0.902.67
  • 91.0.864.70
  • 21.11.2.538
Product Yandex Version 21.11.2.538

Digital Signatures

Signer Root Status
YANDEX LLC GlobalSign CodeSigning CA - G3 Self Signed
Yandex LLC GlobalSign Extended Validation CodeSigning CA - SHA256 - G3 Self Signed

File Traits

  • 2+ executable sections
  • HighEntropy
  • No Version Info
  • x64

Block Information

Total Blocks: 2,343
Potentially Malicious Blocks: 569
Whitelisted Blocks: 1,338
Unknown Blocks: 436

Visual Map

x 0 0 0 0 0 0 x ? x ? x 0 0 ? x x 0 0 ? 0 ? 0 ? ? ? 0 0 ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? 0 0 ? ? 0 0 0 ? 0 ? ? 0 0 ? 0 0 ? 0 ? ? ? 0 0 ? 0 0 0 0 ? 0 0 ? 0 0 ? 0 0 ? ? ? 0 0 0 ? ? 0 0 x 0 0 ? ? ? ? 0 ? 0 0 0 ? ? ? 0 0 0 0 0 ? ? 0 0 ? 0 0 ? 0 0 0 0 ? ? 0 ? 0 0 ? ? 0 0 0 0 0 0 ? 0 ? 0 ? x ? 0 x ? ? 0 ? 0 ? ? 0 0 0 ? 0 0 0 0 ? ? 0 ? ? 0 ? 0 x 0 x ? 0 ? 0 ? 0 x x 0 x x ? x x ? x 0 ? 0 0 0 ? x ? ? ? ? x ? x x x x ? ? ? ? ? x ? ? x x x 0 x x 0 ? 0 ? x 0 0 0 0 ? ? ? ? 0 ? 0 ? 0 ? ? 0 0 0 ? 0 0 0 0 ? ? 0 ? 0 ? ? 0 0 0 ? 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x x x ? 0 0 0 ? 0 ? ? x 0 0 x 0 0 0 ? 0 ? 0 0 ? ? ? ? 0 ? 0 ? ? ? ? ? ? x 0 x x x 0 ? x x 0 0 ? ? x x 0 x x x x x x x x 0 x ? 0 0 0 0 0 x 0 x 0 ? ? 0 x x x 0 0 0 0 0 0 x ? x x x x 0 0 x 0 0 ? x ? 0 0 x 0 0 0 0 0 0 x x x ? x 0 0 x x ? ? x 0 ? ? ? 0 0 0 0 ? 0 0 0 0 ? 0 ? 0 ? 0 0 0 0 0 0 0 0 0 ? 0 ? 0 0 ? ? x x x x x 0 x x x 0 x ? ? ? ? 0 0 0 0 0 0 0 ? x 0 0 x 0 x 0 x 0 0 x x x x x x x x x x x x 0 x 0 ? ? 0 x x x x ? x 0 x 0 x x 0 x x 0 0 0 0 0 x 0 x x x x x 0 x 0 0 x x 0 x x 0 ? 0 x 0 ? x x 0 ? x x 0 x 0 0 0 0 ? x 0 x x x 0 0 ? x x x 0 x x x x x x x x ? x 0 x x x 0 x ? 0 ? x x x x x 0 x 0 0 0 x x x x x ? 0 x x 0 0 x x x 0 ? x 0 x x x 0 0 0 x 0 0 x 0 x x ? x 0 0 0 0 x x x 0 0 x x 0 0 0 0 0 0 x x ? 0 ? 0 0 0 0 ? ? ? 0 0 x 0 0 x 0 0 0 x 0 0 0 0 0 0 0 x ? ? ? ? ? x 0 0 x 0 ? x ? ? 0 0 0 0 0 0 x x x 0 x x 0 0 0 0 0 0 0 x x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x 0 ? ? 0 ? 0 0 0 0 x 0 x x 0 0 0 x 0 0 x 0 x ? 0 x x x ? x x x ? 0 x ? ? x 0 x x ? ? 0 x x 0 0 0 ? 0 x x 0 x 0 x 0 0 ? x x 0 0 x x x x 0 x x 0 x x x x x x 0 x x 0 0 x 0 x 0 0 ? x 0 0 0 0 0 0 ? 0 0 x 0 0 0 x 0 0 0 0 ? 0 0 ? ? ? ? 0 ? ? x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 ? 0 0 0 0 ? ? 0 ? ? 0 0 0 ? ? ? x ? 0 0 0 ? ? 0 0 0 ? ? ? 0 ? 0 0 x x 0 x 0 0 0 0 0 0 0 ? x 0 0 0 0 ? ? ? ? ? 0 0 x x x 0 0 x x x x ? ? x x ? x 0 0 ? 0 ? x ? x ? 0 0 ? 0 ? 0 0 0 ? ? ? 0 0 ? x ? 0 0 0 x x x 0 x x 0 x 0 0 0 0 ? 0 ? 0 0 ? 0 0 x ? 0 ? 0 x ? 0 0 ? x x x 0 ? ? x ? x ? ? 0 ? 0 ? ? 0 0 0 0 0 ? ? ? x 0 ? ? 0 0 ? 0 0 0 ? ? 0 0 x 0 0 ? ? x ? ? x 0 ? x x x 0 x 0 0 x 0 x ? x 0 0 0 ? 0 ? ? 0 ? ? 0 x ? x ? x 0 ? x x 0 ? 0 x 0 x 0 ? 0 ? x x 0 x 0 x x 0 0 0 x 0 0 0 0 0 0 0 0 ? x ? x x x x 0 x x x 0 0 0 0 0 0 ? ? 0 0 x 0 0 x 0 x 0 0 ? ? 0 ? ? 0 ? 0 0 x ? ? 0 x x ? ? x ? ? ? x 0 x x x 0 ? x x 0 0 ? ? x x 0 x x x x x x x x 0 x ? 0 0 0 x 0 x 0 ? ? 0 x x x 0 0 0 0 0 0 x 0 ? 0 0 0 0 0 0 0 0 0 0 x 0 0 ? x 0 ? x 0 0 ? x ? ? 0 ? x 0 0 0 0 ? ? ? ? 0 ? 0 x 0 x ? x x 0 0 0 0 x ? ? ? ? ? x ? x x x x 0 0 0 ? 0 0 0 ? 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 x ? x 0 ? 0 ? 0 0 0 0 x ? ? x ? x x x x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 ? x x x x 0 x x x ? 0 0 x 0 0 x 0 ? 0 0 0 x 0 x 0 0 0 ? ? 0 x 0 ? x ? 0 x x x x 0 ? ? 0 ? x ? x 0 0 0 x x x x x x ? ? x x ? x 0 0 x x x 0 0 0 ? x x x ? 0 x ? ? x x x x ? x 0 ? x ? 0 0 x x 0 x 0 x 0 x 0 0 0 0 ? x x x 0 x ? ? 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 x x 0 0 0 x x 0 x ? x 0 0 0 x 0 0 0 x x x 0 x x x x x ? 0 0 0 0 x x x x ? x x 0 x x x ? 0 ? 0 x x ? 0 x x x x 0 ? 0 0 0 0 ? x ? 0 0 ? 0 x 0 ? x ? ? x 0 0 ? ? 0 x x x 0 ? ? x x x x x 0 0 x x ? 0 x x x ? x 0 x 0 x x 0 0 0 0 0 x x 0 x 0 0 0 ? x 0 ? ? 0 0 0 ? 0 ? 0 0 0 0 x 0 x x ? ? x ? x 0 0 x 0 0 0 ? x 0 0 0 0 x ? 0 0 0 0 ? 0 0 0 0 x ? 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x 0 x 0 x 0 0 x 0 0 ? x 0 x x 0 0 0 0 ? 0 x 0 0 0 0 x x 0 x 0 ? 0 0 0 0 0 x x 0 ? ? ? 0 x 0 0 0 x ? x ? 0 0 0 x ? 0 0 x 0 x 0 ? x x 0 0 x x 0 x x 0 x 0 0 0 x 0 0 x 0 ? x 0 x
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Expiro.L

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryInformationProcess
Show More
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • UNKNOWN
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState

Trending

Most Viewed

Loading...