Coinminer.Linux.MALXMR.UWEJC
HEUR:RiskTool.Linux.BitCoinMiner.b(Kaspersky); Linux.Coinminer(Norton)
Linux
Threat Type: Coinminer
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
Dropped by other malware, Downloaded from the Internet
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.
TECHNICAL DETAILS
1,789,280 bytes
ELF
Yes
21 Mar 2019
Arrival Details
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Other Details
This Coinminer does the following:
- Mine in the following pools: xmr.{BLOCKED}l.com:13531
- Uses the folllowing Wallet Addresses:
- {BLOCKED}zzq46N1z2pZWAVdeA6JvUL9TCB2bnBiA3ZzoqEdYJnMydt5akCa3vtmapeDsbVKGPFdNkzqTcJS8M8oyK7WGijzKrMTGkC671HT6
- {BLOCKED}QhyDBCZokwmVd5HG5Gp7UrAeLVuVmZbKcs4rTZTx1UXGECxbePXha3qncffYYhJjG5FRGxM1scV9dbN62VCGiPdtQ
It accepts the following parameters:
- -a, --algo=ALGO = specify the algorithm to use
auto
tube
xhv - haven pool
trtl - turtlecoin
gpu
invalid
cryptonight
cryptonight/0
cryptonight/1
cryptonight/xtl - stellite pool
cryptonight/msr - masari pool
cryptonight/xao - alloy pool
cryptonight/rto - arto pool
cryptonight/2
cryptonight/half
cryptonight/xtlv9
cryptonight/wow -wownero pool
cryptonight/r - -o, --url=URL = URL of mining server
- -O, --userpass=U:P = username:password pair for mining server
- -u, --user=USERNAME = username for mining server
- -p, --pass=PASSWORD = password for mining server
- --rig-id=ID = rig identifier for pool-side statistics (needs pool support)
- -t, --threads=N = number of miner threads
- -v, --av=N = algorithm variation, 0 auto select
- -k, --keepalive = send keepalived packet for prevent timeout (needs pool support)
- --nicehash = enable nicehash.com support
- --tls = enable SSL/TLS support (needs pool support)
- --tls-fingerprint=F = pool TLS certificate fingerprint, if set enable strict certificate pinning
- -r, --retries=N = number of times to retry before switch to backup server (default: 5)
- -R, --retry-pause=N = time to pause
It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency. This behavior makes the system run abnormally slow.
SOLUTION
9.850
14.886.03
21 Mar 2019
14.887.00
22 Mar 2019
Scan your computer with your Trend Micro product to delete files detected as Coinminer.Linux.MALXMR.UWEJC. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.