{"id":86752,"date":"2018-09-03T15:57:58","date_gmt":"2018-09-03T10:27:58","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86752"},"modified":"2018-09-03T16:44:41","modified_gmt":"2018-09-03T11:14:41","slug":"invisible-monero-xmr-miner","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/invisible-monero-xmr-miner\/","title":{"rendered":"I am invisible &#8211; Monero (XMR) Miner"},"content":{"rendered":"<p>From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money.<\/p>\n<p>Recently Quick Heal Security Labs came across a malware which mines Monero(XMR). This miner has many different components in it. The infection vector of this mining malware is still unconfirmed, but based on attribution this miner arrives on the system via spear phishing, malvertising etc.<\/p>\n<p><strong><b>\u00a0<\/b><\/strong><strong><b>Technical <\/b><\/strong><strong><b>Analysis<\/b><\/strong>:<\/p>\n<p>Analyzed Miner is a self-extracting executable (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Self-extracting_archive\"><u>SFX<\/u><\/a>). It extracts components at \u201c<strong><em><b><i>C:\\Program Files\\Windriverhost<\/i><\/b><\/em><\/strong>\u201d as listed below:<\/p>\n<ol>\n<li>vbs (VBScript)<\/li>\n<li>exe (Extraction utility)<\/li>\n<li>rar (Password Protected Archive)<\/li>\n<li>bat (Batch File)<\/li>\n<\/ol>\n<figure id=\"attachment_86765\" aria-describedby=\"caption-attachment-86765\" style=\"width: 797px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86765\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig1_level1extr.png\" alt=\"\" width=\"797\" height=\"245\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig1_level1extr.png 797w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig1_level1extr-300x92.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig1_level1extr-768x236.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig1_level1extr-650x200.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig1_level1extr-789x243.png 789w\" sizes=\"(max-width: 797px) 100vw, 797px\" \/><figcaption id=\"caption-attachment-86765\" class=\"wp-caption-text\">Fig 1 : Extracted components of the malware<\/figcaption><\/figure>\n<p>After extraction of components, it starts VBScript(jsnel.vbs) as shown in Fig 2.<\/p>\n<figure id=\"attachment_86766\" aria-describedby=\"caption-attachment-86766\" style=\"width: 871px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86766\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig2_create_process_first_vbs2.1.png\" alt=\"\" width=\"871\" height=\"65\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig2_create_process_first_vbs2.1.png 871w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig2_create_process_first_vbs2.1-300x22.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig2_create_process_first_vbs2.1-768x57.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig2_create_process_first_vbs2.1-650x49.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig2_create_process_first_vbs2.1-789x59.png 789w\" sizes=\"(max-width: 871px) 100vw, 871px\" \/><figcaption id=\"caption-attachment-86766\" class=\"wp-caption-text\">Fig 2 : Starting jsnel.vbs<\/figcaption><\/figure>\n<p><strong><b>jsnel.vbs<\/b><\/strong>\u00a0contains a simple piece of code to launch <strong><b>chax.bat<\/b><\/strong><strong><b>.<\/b><\/strong><\/p>\n<figure id=\"attachment_86767\" aria-describedby=\"caption-attachment-86767\" style=\"width: 437px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86767\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig3_jsnelVBS_.png\" alt=\"\" width=\"437\" height=\"37\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig3_jsnelVBS_.png 437w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig3_jsnelVBS_-300x25.png 300w\" sizes=\"(max-width: 437px) 100vw, 437px\" \/><figcaption id=\"caption-attachment-86767\" class=\"wp-caption-text\">Fig 3 : Content of jsnel.vbs<\/figcaption><\/figure>\n<p><strong><b>rar.exe<\/b><\/strong>\u00a0is command line utility to unpack archives. Here it is used to unpack password protected <strong><b>db.rar<\/b><\/strong>.<\/p>\n<p><strong><b>chax.bat<\/b><\/strong>\u00a0file\u00a0contains commands to delete old version components of Password Protected Archive\u00a0and malware as shown in Fig 4.<\/p>\n<figure id=\"attachment_86768\" aria-describedby=\"caption-attachment-86768\" style=\"width: 598px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86768\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig4_chaxbat.png\" alt=\"\" width=\"598\" height=\"345\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig4_chaxbat.png 598w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig4_chaxbat-300x173.png 300w\" sizes=\"(max-width: 598px) 100vw, 598px\" \/><figcaption id=\"caption-attachment-86768\" class=\"wp-caption-text\">Fig 4 : Content of chax.bat<\/figcaption><\/figure>\n<p>Important\u00a0task of chax.bat is to extract below mentioned components of <strong><b>db.rar<\/b><\/strong>\u00a0at the current location and launch ouyk.vbs.<\/p>\n<ol>\n<li>vbs(VBScript)<\/li>\n<li>bat(Batch file)<\/li>\n<li>json(Configuration file)<\/li>\n<li>driverhost.exe\u00a0(Mining tool)<\/li>\n<\/ol>\n<figure id=\"attachment_86769\" aria-describedby=\"caption-attachment-86769\" style=\"width: 800px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86769\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig5_level2extr.png\" alt=\"\" width=\"800\" height=\"414\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig5_level2extr.png 800w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig5_level2extr-300x155.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig5_level2extr-768x397.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig5_level2extr-650x336.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig5_level2extr-789x408.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-86769\" class=\"wp-caption-text\">Fig 5 : Extracted components of db.rar<\/figcaption><\/figure>\n<p>Similar to previous VBScript(jsnel.vbs),\u00a0this script(ouyk.vbs)\u00a0too just launches batch file(xvvq.bat).<\/p>\n<figure id=\"attachment_86770\" aria-describedby=\"caption-attachment-86770\" style=\"width: 413px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86770\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig6_vbs_ouyk_vbs.png\" alt=\"\" width=\"413\" height=\"43\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig6_vbs_ouyk_vbs.png 413w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig6_vbs_ouyk_vbs-300x31.png 300w\" sizes=\"(max-width: 413px) 100vw, 413px\" \/><figcaption id=\"caption-attachment-86770\" class=\"wp-caption-text\">Fig 6 : Content of ouyk.vbs<\/figcaption><\/figure>\n<p><strong><b>xvvq.bat <\/b><\/strong>has two main purposes:<\/p>\n<ol>\n<li>To keep the system always ON using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Powercfg\"><strong><u><b>P<\/b><\/u><\/strong><strong><u><b>ower<\/b><\/u><\/strong><strong><u><b>CFG<\/b><\/u><\/strong><\/a> command, so that mining is not interrupted.<\/li>\n<\/ol>\n<p><em><i>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u201c<\/i><\/em><strong><em><b><i>powercfg -change -standby-timeout-ac 0<\/i><\/b><\/em><\/strong><em><i>\u201d<\/i><\/em><em><i>\u00a0<\/i><\/em><\/p>\n<ol start=\"2\">\n<li>To hide driverhost.exe from analysis tools:<\/li>\n<\/ol>\n<p><em><i>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/i><\/em>It enumerates processes using <strong><b>tasklist <\/b><\/strong>command\u00a0to check if any of below-listed\u00a0process is\u00a0running, and if it finds any of these processes\u00a0are running, it kills driverhost.exe.<\/p>\n<p><em><i>\u00a0 \u00a0 \u00a0\u201c<\/i><\/em><em><i>taskmgr.exe<\/i><\/em><em><i>\u201d<\/i><\/em><\/p>\n<p><em><i>\u00a0 \u00a0 \u00a0\u201c<\/i><\/em><em><i>perfmon.exe<\/i><\/em><em><i>\u201d<\/i><\/em><\/p>\n<p><em><i>\u00a0 \u00a0 \u201c<\/i><\/em><em><i>ProcessHacker.exe<\/i><\/em><em><i>\u201d<\/i><\/em><\/p>\n<p><em><i>\u00a0 \u00a0 \u201c<\/i><\/em><em><i>procexp.exe<\/i><\/em><em><i>\u201d<\/i><\/em><\/p>\n<p><em><i>\u00a0 \u00a0 \u201c<\/i><\/em><em><i>procexp64.exe<\/i><\/em><em><i>\u201d<\/i><\/em><\/p>\n<p><em><i>\u00a0 \u00a0 \u201c<\/i><\/em><em><i>dumpcap.exe<\/i><\/em><em><i>\u201d<\/i><\/em><\/p>\n<p><em><i>\u00a0 \u00a0 \u201c<\/i><\/em><em><i>Wireshark.exe<\/i><\/em><em><i>\u201d<\/i><\/em><\/p>\n<p><em><i>\u00a0 \u00a0 \u201c<\/i><\/em><em><i>anvir.exe<\/i><\/em><em><i>\u201d<\/i><\/em><\/p>\n<p>But there is a bug in xvvq.bat,\u00a0it checks\u00a0only for taskmgr.exe and kills\u00a0dirverhost.exe as shown in Fig 7. And if any other process like procexp.exe is running it does not kill driverhost.exe.<\/p>\n<figure id=\"attachment_86771\" aria-describedby=\"caption-attachment-86771\" style=\"width: 865px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86771\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig7_xvvq_bat.png\" alt=\"\" width=\"865\" height=\"599\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig7_xvvq_bat.png 865w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig7_xvvq_bat-300x208.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig7_xvvq_bat-768x532.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig7_xvvq_bat-563x390.png 563w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig7_xvvq_bat-789x546.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig7_xvvq_bat-229x158.png 229w\" sizes=\"(max-width: 865px) 100vw, 865px\" \/><figcaption id=\"caption-attachment-86771\" class=\"wp-caption-text\">Fig 7 : Content of xvvq.bat<\/figcaption><\/figure>\n<p>And if none of the above mentioned processes are\u00a0running, then\u00a0it starts <strong><b>driverhost.exe<\/b><\/strong>\u00a0which is\u00a0a\u00a0core mining tool.\u00a0It keeps on checking for all these processes continuously using an infinite loop in xvvq.bat and act accordingly.<\/p>\n<p><strong><b>config.json<\/b><\/strong>\u00a0is\u00a0a configuration\u00a0file,\u00a0which stores data such as username, password, max CPU usage, etc. as shown in Fig 8.<\/p>\n<figure id=\"attachment_86772\" aria-describedby=\"caption-attachment-86772\" style=\"width: 728px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86772\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig8_json_file.png\" alt=\"\" width=\"728\" height=\"502\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig8_json_file.png 728w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig8_json_file-300x207.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig8_json_file-566x390.png 566w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig8_json_file-229x158.png 229w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><figcaption id=\"caption-attachment-86772\" class=\"wp-caption-text\">Fig 8 : Content of config.json<\/figcaption><\/figure>\n<p>On execution, <strong><b>driverhost.exe<\/b><\/strong>\u00a0reads miner configurations from config.json and connects to \u201c<strong><em><b><i>xmr[.]pool[.]minergate[.]com<\/i><\/b><\/em><\/strong><em><i>\u201d, <\/i><\/em>and sends username and password from config.json to server and starts mining with port <strong><em><b><i>45560<\/i><\/b><\/em><\/strong><strong><b>\u00a0<\/b><\/strong>(port used for mining). as shown in Fig 9 and Fig 10.<\/p>\n<figure id=\"attachment_86773\" aria-describedby=\"caption-attachment-86773\" style=\"width: 1215px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86773\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig9_wireshark_editedv1.png\" alt=\"\" width=\"1215\" height=\"573\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig9_wireshark_editedv1.png 1215w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig9_wireshark_editedv1-300x141.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig9_wireshark_editedv1-768x362.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig9_wireshark_editedv1-650x307.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig9_wireshark_editedv1-789x372.png 789w\" sizes=\"(max-width: 1215px) 100vw, 1215px\" \/><figcaption id=\"caption-attachment-86773\" class=\"wp-caption-text\">Fig 9 : Network Analysis<\/figcaption><\/figure>\n<figure id=\"attachment_86774\" aria-describedby=\"caption-attachment-86774\" style=\"width: 1421px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86774\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig10_response_jsonv1.png\" alt=\"\" width=\"1421\" height=\"99\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig10_response_jsonv1.png 1421w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig10_response_jsonv1-300x21.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig10_response_jsonv1-768x54.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig10_response_jsonv1-650x45.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig10_response_jsonv1-789x55.png 789w\" sizes=\"(max-width: 1421px) 100vw, 1421px\" \/><figcaption id=\"caption-attachment-86774\" class=\"wp-caption-text\">Fig 10 : Sends username and password to the server<\/figcaption><\/figure>\n<p>It limits CPU usage to 35% for mining as shown in Fig 11.<\/p>\n<figure id=\"attachment_86776\" aria-describedby=\"caption-attachment-86776\" style=\"width: 900px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86776\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig11_procpu_usagev2.2.png\" alt=\"\" width=\"900\" height=\"68\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig11_procpu_usagev2.2.png 900w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig11_procpu_usagev2.2-300x23.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig11_procpu_usagev2.2-768x58.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig11_procpu_usagev2.2-650x49.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig11_procpu_usagev2.2-789x60.png 789w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><figcaption id=\"caption-attachment-86776\" class=\"wp-caption-text\">Fig 11 : CPU Usage by driverhost.exe<\/figcaption><\/figure>\n<p>For persistence, malware adds a shortcut\u00a0in\u00a0the startup\u00a0folder for <strong><b>ouyk<\/b><\/strong><strong><b>.vbs<\/b><\/strong>\u00a0with name driverhost.lnk.<\/p>\n<figure id=\"attachment_86777\" aria-describedby=\"caption-attachment-86777\" style=\"width: 855px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86777\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig12_write_file_startup.png\" alt=\"\" width=\"855\" height=\"70\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig12_write_file_startup.png 855w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig12_write_file_startup-300x25.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig12_write_file_startup-768x63.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig12_write_file_startup-650x53.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig12_write_file_startup-789x65.png 789w\" sizes=\"(max-width: 855px) 100vw, 855px\" \/><figcaption id=\"caption-attachment-86777\" class=\"wp-caption-text\">Fig 12 : Creating a shortcut for ouyk.vbs<\/figcaption><\/figure>\n<figure id=\"attachment_86778\" aria-describedby=\"caption-attachment-86778\" style=\"width: 809px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86778\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/fig13_startup.png\" alt=\"\" width=\"809\" height=\"438\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig13_startup.png 809w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig13_startup-300x162.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig13_startup-768x416.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig13_startup-650x352.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/fig13_startup-789x427.png 789w\" sizes=\"(max-width: 809px) 100vw, 809px\" \/><figcaption id=\"caption-attachment-86778\" class=\"wp-caption-text\">Fig 13 : Shortcut to ouyk.vbs in the startup folder<\/figcaption><\/figure>\n<p><strong>Execution Flow of miner:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-86780\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/09\/final_execution_flow_diagram.gif\" alt=\"\" width=\"960\" height=\"720\" \/><\/p>\n<p><strong><b>I<\/b><\/strong><strong><b>OC<\/b><\/strong>:<\/p>\n<p>SHA256: b4ea81958403f717c1a20f18731ef05b648465c7e20cbc6f45bd2f5166c7c940<\/p>\n<p>URL: hxxp:\/\/xmr[.]pool[.]minergate[.]com:45560<\/p>\n<p><a href=\"https:\/\/bit.ly\/2ncPU26\"><u>Quick Heal<\/u><\/a>\u00a0detects this Miner\u00a0as \u201c<strong><b>Trojan.Occamy<\/b><\/strong>\u201d.<\/p>\n<p><strong><b>Conclusion<\/b><\/strong>:<\/p>\n<p>As the price and appreciation of digital currencies has grown exponentially, mining malware too have increased over the last year. In fact, miners are so common that thousands of computers are already infected. The number of mining malware has increased and they have also become complex as discussed in the above blog post.<\/p>\n<p><strong>Subject Matter Expert<\/strong><\/p>\n<p>Ravi Gidwani,\u00a0 Pratik Pachpor | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs came across a malware which mines Monero(XMR). This miner has many different components in it. The [&hellip;]<\/p>\n","protected":false},"author":51,"featured_media":86781,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1613,289,24,5],"tags":[1620,1619,1607,1533,1618],"class_list":["post-86752","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptojacking","category-cyber-safety","category-malware","category-security","tag-archive","tag-dropper","tag-mining","tag-monero","tag-multi-component"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86752"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86752"}],"version-history":[{"count":6,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86752\/revisions"}],"predecessor-version":[{"id":86799,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86752\/revisions\/86799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86781"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}