The problem for the victim is that her computer infected with a crypto miner runs much slower than usual ...
... advanced malware stops working during the launch of "heavy" applications like games on the PC ...
There are a lot of miners, and the difficulty of detecting them is that mining itself is a standard process. These are not attempts to erase or modify files, change the contents of the boot sector of a hard disk, etc. No, mining in the usual case will not be determined by antivirus. Therefore, antivirus developers have to look for new ways to determine the presence of such programs on victims' computers.
Miner Trojan.BtcMine.1259 is downloaded to the computer by Trojan-loader Trojan.DownLoader24.64313, which, in turn, is distributed using the DoublePulsar backdoor. Immediately after launching, Trojan.BtcMine.1259 checks whether its copy is running on the infected computer. Then it determines the number of processor cores, and if it is greater than or equal to the number of threads specified in the Trojan’s configuration, it decrypts and loads the library stored in its body into memory. This library is a modified version of the open source remote administration system known as Gh0st RAT (it is detected by Dr.Web Anti-virus under the name BackDoor.Farfli.96). Then Trojan.BtcMine.1259 saves its copy to the disk and starts it as a system service. After a successful launch, the Trojan attempts to download its update from the management server whose address is specified in the configuration file.
Trojan.BtcMine.1, uses two legitimate mining programs, by which it uses the computing resources of the victim's computer in order to “extract” virtual coins. Being an unsuspecting user running on the system, Trojan.BtcMine.1 saves itself to a temporary folder under the name udpconmain.exe. Then he writes the path to the executable file in the registry key responsible for the application startup. Then the malware downloads from the Internet and places the second “miner” in the temporary folder under the name miner.exe in order to maximally load the computer with calculations. After that, the Trojans connect to one of the pools of the payment system and start making calculations, earning the corresponding reward for the intruders. In the illustration you can see the load on the processor that is created by the miner program launched by the Trojan.BtcMine.1 Trojan.
Trojan.BtcMine.1065 (2) Trojan.BtcMine.1084 Trojan.BtcMine.1177 Trojan.BtcMine.1247 Trojan.BtcMine.1336 Trojan.BtcMine.1421 (3) Trojan.BtcMine.1440 Trojan.BtcMine.1447 (2) Trojan .BtcMine.1448 (10) Trojan.BtcMine.1449 Trojan.BtcMine.1500 Trojan.BtcMine.1501 Trojan.BtcMine.1502 (2) Trojan.BtcMine.1503 Trojan.BtcMine.1506 Trojan.BtcMine.1507 Trojan.BtcMine.1508
Tool.BtcMine.1000 Tool.BtcMine.1001 Tool.BtcMine.1002 Tool.BtcMine.1003 (2) Tool.BtcMine.1004 Tool.BtcMine.1005 Tool.BtcMine.1006 Tool.BtcMine.1007 Tool.BtcMine.1008 (2 ) Tool.BtcMine.1009 (2) Tool.BtcMine.1010 (2) Tool.BtcMine.1011 (4) Tool.BtcMine.1012 Tool.BtcMine.1013 Tool.BtcMine.1014 Tool.BtcMine.1015 Tool.BtcMine.1016 (2) Tool.BtcMine.1021 (2) Tool.BtcMine.1022 Tool.BtcMine.1023 (2) Tool.BtcMine.1024 Tool.BtcMine.1025 Tool.BtcMine.1026 Tool.BtcMine.1027 (3) Tool.BtcMine .1028 (2) Tool.BtcMine.1029 (2) Tool.BtcMine.1030 (2) Tool.BtcMine.230 Tool.BtcMine.278 Tool.BtcMine.288 (7) Tool.BtcMine.390 (2) Tool.BtcMine .433 Tool.BtcMine.483 (2) Tool.BtcMine.573 (3) Tool.BtcMine.800 Tool.BtcMine.810 (11) Tool.BtcMine.916 (2) Tool.BtcMine.917 Tool.BtcMine.943 Tool .BtcMine.944 (7) Tool.BtcMine.948 (2) Tool.BtcMine.958 (3) Tool.BtcMine.968 Tool.BtcMine.970 (4) Tool.BtcMine.973 (4) Tool.BtcMine.974 Tool .BtcMine.975 Tool.BtcMine.976 Tool.BtcMine.977 (4) Tool.BtcMine.978 (6) Tool.BtcMine.979 Tool.BtcMine.980 Tool.BtcMine. 981 (3) Tool.BtcMine.982 Tool.BtcMine.983 Tool.BtcMine.984 Tool.BtcMine.985 Tool.BtcMine.986 Tool.BtcMine.987 (2) Tool.BtcMine.988 Tool.BtcMine.989 Tool.BtcMine .990 Tool.BtcMine.991 (4) Tool.BtcMine.992 Tool.BtcMine.993 Tool.BtcMine.994 Tool.BtcMine.995 Tool.BtcMine.996 (2) Tool.BtcMine.997 Tool.BtcMine.998 Tool. BtcMine.999 Tool.Linux.BtcMine.163 Tool.Linux.BtcMine.164 Tool.Linux.BtcMine.165 Tool.Linux.BtcMine.166 Tool.Linux.BtcMine.167 Tool.Linux.BtcMine.168 Tool.Linux.BtcMine .169 Tool.Linux.BtcMine.170 Tool.Linux.BtcMine.171 Tool.Linux.BtcMine.172 Tool.Linux.BtcMine.173 Tool.Linux.BtcMine.174 Tool.Linux.BtcMine.175 Tool.Linux.BtcMine. 176 Tool.Linux.BtcMine.178 Tool.Linux.BtcMine.179 Tool.Linux.BtcMine.180 Tool.Linux.BtcMine.181 Tool.Linux.BtcMine.182 Tool.Linux.BtcMine.183 Tool.Linux.BtcMine.184 Tool.Linux.BtcMine.186 Tool.Linux.BtcMine.187 Tool.Linux.BtcMine.188 Tool.Linux.BtcMine.189 Tool.Linux.BtcMine.190 Tool.Linux.BtcMine.191 Tool .Linux.BtcMine.194 Tool.Linux. BtcMine.195 Tool.Linux.BtcMine.196 Tool.Linux.BtcMine.197 Tool.Linux.BtcMine.198 Tool.Linux.BtcMine.199 Tool.Linux.BtcMine.201 Tool.Linux.BtcMine.202 Tool.Linux.BtcMine .203 Tool.Linux.BtcMine.204 Tool.Linux.BtcMine.205 Tool.Linux.BtcMine.206 Tool.Linux.BtcMine.207 Tool.Linux.BtcMine.208 Tool.Linux.BtcMine.209 Tool.Linux.BtcMine. 210 Tool.Linux.BtcMine.211 Tool.Linux.BtcMine.212 Tool.Linux.BtcMine.213 Tool.Linux.BtcMine.214 Tool.Linux.BtcMine.215 Tool.Linux.BtcMine.216 Tool.Linux.BtcMine.219 Tool.Linux.BtcMine.220 Tool.Linux.BtcMine.221 Tool.Linux.BtcMine.222 Tool.Linux.BtcMine.223 Tool.Linux.BtcMine.224 Tool.Linux.BtcMine.225 Tool.Linux.BtcMine.226 Tool .Linux.BtcMine.227 Tool.Linux.BtcMine.228 Tool.Linux.BtcMine.229 Tool.Mac.BtcMine.35 Tool.Mac.BtcMine.36 Tool.Mac.BtcMine.37 Tool.Mac.BtcMine.38 Tool. Mac.BtcMine.39 Tool.Mac.BtcMine.40 Tool.Mac.BtcMine.41 Tool.Mac.BtcMine.42 Tool.Mac.BtcMine.43 Tool.Mac.BtcMine.44 Tool.Mac.BtcMine.45 Tool.Mac .BtcMine.46 Tool.Mac.BtcMine.47 Tool.Mac.BtcMin e.48 Tool.Mac.BtcMine.50 Tool.Mac.BtcMine.51 Tool.Mac.BtcMine.52 Tool.Mac.BtcMine.53 Tool.Mac.BtcMine.54 Tool.Mac.BtcMine.55 Tool.Mac.BtcMine .56 Tool.Mac.BtcMine.57
Android-miners Android.CoinMine.1.origin and Android.CoinMine.2.origin, designed for the extraction of virtual currencies Litecoin, Dogecoin and Casinocoin were distributed by attackers in the popular applications they modified and activated in those periods of time when the mobile device was not used by its owner . Since these malicious programs actively used the hardware resources of infected smartphones and tablets, this could cause them to overheat, accelerate battery drain and even result in financial losses for users due to excessive consumption of Internet traffic by Trojans. And in April 2014, new versions of these Trojans appeared, which were discovered in the Google Play catalog and intended for the extraction of Bitcoin cryptocurrency. These malicious applications were hidden in harmless "live wallpaper" and also began their illegal activities if the infected mobile device was not used for a certain time.
The attackers placed on the VCIOM server web pages from which visitors were offered to download the malware under the guise of various “useful” files.
Both the Russian-language (wciom.ru) and the English-language (wciom.com) versions of the VTsIOM official web site have been cracked. Cybercriminals created a special section on the compromised server that hosted web pages with headlines that are highly popular according to search engine statistics: for example, “new-commands-chl-2015-2016”, “download-book-metro-2035-in- format-fb2 "," catalogs-avon-12-2015-view-online-free-russia-flipping "," traffic jams-on-the-route-m4-dong-today-online "," download-adblock ", etc. When you try to open such a link in a browser window, the user was shown a fake webpage of a popular file storage service. “Yandex.Disk” or a web page with the title WCIOM.RU, where a potential victim was offered to download the archive allegedly with some “useful” content, for example, the popular book “Metro 2035” or the latest Avon catalog.
Trojan.BtcMine.737 lists the computers available in the network environment and tries to connect to them, sorting through logins and passwords using the special list at its disposal. In addition, the malware is trying to find the password to the local Windows user account. If this succeeds, Trojan.BtcMine.737, if it has the appropriate equipment, launches an open WiFi access point on the infected computer. If the malware was able to access one of the computers on the local network, an attempt is made to save and run a copy of the Trojan on it either using the Windows Management Instrumentation (WMI) toolkit or using the Task Scheduler
Source: https://habr.com/ru/post/357424/
All Articles