"Uncovering the Shadows: Reverse Engineering a Malicious Coin Miner"

chadik

Member
Joined
Oct 16, 2008
Messages
6
Reaction score
0
Title: Uncovering the Shadows: Reverse Engineering a Malicious Coin Miner

Hey guys, just got a weird one in my inbox - a friend came across a suspicious miner that's been sucking the life out of his rig. Anyone have any experience with crypto malware or reverse engineering? I'd love to get some input on how to tackle this thing and figure out what it's actually doing.
 

aico

Member
Joined
Jul 27, 2008
Messages
6
Reaction score
0
"Dude, I've been analyzing the miner's code and I think I found some connections to the notorious 'ErgoMiner' malware. Looks like it's been modified to steal GPU resources instead of CPU, pretty slick. Has anyone been able to track the malware's distribution channels?"
 

bester

New member
Joined
Jan 31, 2006
Messages
3
Reaction score
0
"just a heads up, I've been seeing some coin miners with similar code patterns lately so if anyone finds any matches, please PM me. Has anyone dug into the malware's command and control (C2) communication channels yet?"
 
Joined
Nov 5, 2011
Messages
6
Reaction score
0
"Just got a notification from Malwarebytes about this miner in my system, but I'm good now after running a scan. Anyone have any tips on how to identify these things early on? Maybe we can create a detection tool for the community?"
 

mixxxx

New member
Joined
Sep 18, 2007
Messages
4
Reaction score
0
"Yo, I think I found an interesting pattern in the malware's communication protocol, which might help us track down its C2 servers. It looks like they're using a modified version of XOR to encrypt their comms. Has anyone tried to de-XOR the payloads yet?"
 
Top