How to put a miner on someone else’s PC. What is the danger of hidden mining – how to get rid of…

Miners and antivirus

I personally encountered the theme of the miners after the statement of German Klimenko that a huge number of servers were amazed by miners. Before that, miners were personally for me only one of the types of malware. There is not so much time since then, but the number of people who want to earn money on other people’s computers is growing and I think it’s time to talk about this phenomenon.

Who cares how many miners are created per day, how they spread and (most importantly) how antiviruses relate to them. I ask for a cat! Let’s start with the last declared topic. about the attitude of antiviruses and miners. To answer this question, you need to understand that there is a malicious program from the point of view of antivirus.

Malicious program is a program installed on a computer without a user person or performing unauthorized actions on a user’s computer. The definition is not perfect, but very close to the truth.

The problem for the sacrifice is that her computer, infected with a cryptoomineer, works much slower than usual.

advanced malignes stop working during the launch of “heavy” applications like games on the PC.

Definitely harmful behavior that make miners the legitimate prey of antiviruses (and other protection systems, because not uniform antiviruses).

But can an antivirus catch a miner?

There are a lot of miners, and the difficulty of detecting them is that mining itself is a standard process. This is not an attempt to wash or modify files, change the contents of the hard drive loading sector, etc.P. No, mining in the usual case will not be determined by antivirus. Therefore, the developers of antiviruses have to look for new ways to determine the availability of such programs on victims computers

Not certainly in that way. The above quote is about the behavioral analyzer (or its variety. cloud antivirus). These components of antivirus really monitor behavior. And if the harmful program was engaged in purely mining, then it would really decide that it was a harmful program or not, it would be impossible. Therefore, I propose to see what miners are.

Roughly speaking, two. The first to implements mining with a self.signed component. And here everything is clear. the signatures of antivirus bases will not even allow the miner to start, no matter how he penetrated the car. The mentioned article claims that “attackers infect stervers on the network, exploiting vulnerability like Eternalblue”. Wanna Cry spread in the same way. But at the same time, he could not always start. So one of the antiviruses caught him an heuristic, the other in the presence of the cloud turned on. its components.

Trojan miner.BTCMINE.1259 is downloaded on the computer Trojan Trojan Trojan.Downloader24.64313, which, in turn, is distributed using Backdor DoublePulsar. Immediately after the start of Trojan.BTCMINE.1259 checks whether its copy is launched on an infected computer. Then it determines the number of processor nuclei, and if it is more or equal to the Trojan configuration of the number of flows, deciphers and loads the library stored in his body in memory. This library is a modified version of the remote administration system with open source, known by the name GH0ST RAT (detected by DR antivirus.Web under the name Backdoor.Farfli.96). Then Trojan.BTCMINE.1259 saves its copy to the disk and launches it as a system service. After successful launch, the Trojan is trying to download from the control server, the address of which is indicated in the configuration file, its update.

The second option is to use a regular miner.

I Gave My Fire Ants A Chicken Head

Trojan.BTCMINE.1, uses two legitimate mining programs, with the help of which it involves the computing resources of the victim’s computer to “extract” virtual coins. Being an unsuspecting user in the system, Trojan.BTCMINE.1 retains itself in a temporary folder under the name udpconmain.EXE. Then he prescribes the way to the executable file in the vehicle of the registry responsible for the auto.loading of applications. Then the malicious program downloads from the Internet and places in a temporary folder under the name miner.Exe second “miner” in order to maximize the computer as calculates. After that, the Trojan programs are connected to one of the bullets of the payment system and begin to conduct calculations, earning an appropriate reward for attackers. In the illustration, you can see the load on the processor created by the Mainer program, launched by Trojan Trojan.BTCMINE.one.

In this case, to launch a legitimate miner, it must first be delivered to the car, launched and it is advisable to hide the presence of the process in the system/icon in the tria. So there are harmful components that can again be found either by signatures or by behavior

In general. there will be a signature. the miner will not pass. There will be no signature, the miner will be detected by the increased loading of machines and the signature will appear.

How many miners are created? We take a random date for updates.Drweb.com

Trojan.BTCMINE.1065 (2) Trojan.BTCMINE.1084 Trojan.BTCMINE.1177 Trojan.BTCMINE.1247 Trojan.BTCMINE.1336 Trojan.BTCMINE.1421 (3) Trojan.BTCMINE.1440 Trojan.BTCMINE.1447 (2) Trojan.BTCMINE.1448 (10) Trojan.BTCMINE.1449 Trojan.BTCMINE.1500 Trojan.BTCMINE.1501 Trojan.BTCMINE.1502 (2) Trojan.BTCMINE.1503 Trojan.BTCMINE.1506 Trojan.BTCMINE.1507 Trojan.BTCMINE.1508 Tool.BTCMINE.1000 Tool.BTCMINE.1001 Tool.BTCMINE.1002 Tool.BTCMINE.1003 (2) Tool.BTCMINE.1004 Tool.BTCMINE.1005 Tool.BTCMINE.1006 Tool.BTCMINE.1007 Tool.BTCMINE.1008 (2) Tool.BTCMINE.1009 (2) Tool.BTCMINE.1010 (2) Tool.BTCMINE.1011 (4) Tool.BTCMINE.1012 Tool.BTCMINE.1013 Tool.BTCMINE.1014 Tool.BTCMINE.1015 Tool.BTCMINE.1016 (2) Tool.BTCMINE.1021 (2) Tool.BTCMINE.1022 Tool.BTCMINE.1023 (2) Tool.BTCMINE.1024 Tool.BTCMINE.1025 Tool.BTCMINE.1026 Tool.BTCMINE.1027 (3) Tool.BTCMINE.1028 (2) Tool.BTCMINE.1029 (2) Tool.BTCMINE.1030 (2) Tool.BTCMINE.230 Tool.BTCMINE.278 Tool.BTCMINE.288 (7) Tool.BTCMINE.390 (2) Tool.BTCMINE.433 Tool.BTCMINE.483 (2) Tool.BTCMINE.573 (3) Tool.BTCMINE.800 Tool.BTCMINE.810 (11) Tool.BTCMINE.916 (2) Tool.BTCMINE.917 Tool.BTCMINE.943 Tool.BTCMINE.944 (7) Tool.BTCMINE.948 (2) Tool.BTCMINE.958 (3) Tool.BTCMINE.968 Tool.BTCMINE.970 (4) Tool.BTCMINE.973 (4) Tool.BTCMINE.974 Tool.BTCMINE.975 Tool.BTCMINE.976 Tool.BTCMINE.977 (4) Tool.BTCMINE.978 (6) Tool.BTCMINE.979 Tool.BTCMINE.980 Tool.BTCMINE.981 (3) Tool.BTCMINE.982 Tool.BTCMINE.983 Tool.BTCMINE.984 Tool.BTCMINE.985 Tool.BTCMINE.986 Tool.BTCMINE.987 (2) Tool.BTCMINE.988 Tool.BTCMINE.989 Tool.BTCMINE.990 Tool.BTCMINE.991 (4) Tool.BTCMINE.992 Tool.BTCMINE.993 Tool.BTCMINE.994 Tool.BTCMINE.995 Tool.BTCMINE.996 (2) Tool.BTCMINE.997 Tool.BTCMINE.998 Tool.BTCMINE.999 Tool.Linux.BTCMINE.163 Tool.Linux.BTCMINE.164 Tool.Linux.BTCMINE.165 Tool.Linux.BTCMINE.166 Tool.Linux.BTCMINE.167 Tool.Linux.BTCMINE.168 Tool.Linux.BTCMINE.169 Tool.Linux.BTCMINE.170 Tool.Linux.BTCMINE.171 Tool.Linux.BTCMINE.172 Tool.Linux.BTCMINE.173 Tool.Linux.BTCMINE.174 Tool.Linux.BTCMINE.175 Tool.Linux.BTCMINE.176 Tool.Linux.BTCMINE.178 Tool.Linux.BTCMINE.179 Tool.Linux.BTCMINE.180 Tool.Linux.BTCMINE.181 Tool.Linux.BTCMINE.182 Tool.Linux.BTCMINE.183 Tool.Linux.BTCMINE.184 Tool.Linux.BTCMINE.186 Tool.Linux.BTCMINE.187 Tool.Linux.BTCMINE.188 Tool.Linux.BTCMINE.189 Tool.Linux.BTCMINE.190 Tool.Linux.BTCMINE.191 Tool.Linux.BTCMINE.193 Tool.Linux.BTCMINE.194 Tool.Linux.BTCMINE.195 Tool.Linux.BTCMINE.196 Tool.Linux.BTCMINE.197 Tool.Linux.BTCMINE.198 Tool.Linux.BTCMINE.199 Tool.Linux.BTCMINE.201 Tool.Linux.BTCMINE.202 Tool.Linux.BTCMINE.203 Tool.Linux.BTCMINE.204 Tool.Linux.BTCMINE.205 Tool.Linux.BTCMINE.206 Tool.Linux.BTCMINE.207 Tool.Linux.BTCMINE.208 Tool.Linux.BTCMINE.209 Tool.Linux.BTCMINE.210 Tool.Linux.BTCMINE.211 Tool.Linux.BTCMINE.212 Tool.Linux.BTCMINE.213 Tool.Linux.BTCMINE.214 Tool.Linux.BTCMINE.215 Tool.Linux.BTCMINE.216 Tool.Linux.BTCMINE.219 Tool.Linux.BTCMINE.220 Tool.Linux.BTCMINE.221 Tool.Linux.BTCMINE.222 Tool.Linux.BTCMINE.223 Tool.Linux.BTCMINE.224 Tool.Linux.BTCMINE.225 Tool.Linux.BTCMINE.226 Tool.Linux.BTCMINE.227 Tool.Linux.BTCMINE.228 Tool.Linux.BTCMINE.229 Tool.Mac.BTCMINE.35 Tool.Mac.BTCMINE.36 Tool.Mac.BTCMINE.37 Tool.Mac.BTCMINE.38 Tool.Mac.BTCMINE.39 Tool.Mac.BTCMINE.40 Tool.Mac.BTCMINE.41 Tool.Mac.BTCMINE.42 Tool.Mac.BTCMINE.43 Tool.Mac.BTCMINE.44 Tool.Mac.BTCMINE.45 Tool.Mac.BTCMINE.46 Tool.Mac.BTCMINE.47 Tool.Mac.BTCMINE.48 Tool.Mac.BTCMINE.50 Tool.Mac.BTCMINE.51 Tool.Mac.BTCMINE.52 Tool.Mac.BTCMINE.53 Tool.Mac.BTCMINE.54 Tool.Mac.BTCMINE.55 Tool.Mac.BTCMINE.56 Tool.Mac.BTCMINE.57

1 Configuration of the script

The real situation is a Wi-Fi router with connected laptops and smartphones. We checked the script in this situation from the real world. and it works. But for this article, we will analyze in more detail how to establish it in a virtual environment.

To implement this virtual script, we will use Virtualbox.

First of all, you need to download some disk image of Linux and install it by car VirtualBox. In this example, we will use the images of Kali Linux.

After downloading the ISO-image, we prepare three VBOX machines with an established Linux way.

To configure the described script, you need to prepare machines that perform the following roles:

  • Victim
  • The machine that connects to the router and views the web page.
  • The machine where CoffeeMiner starts and MITM-Atak is carried out.
  • Works like a normal gateway.

When performing an attack, the situation will be this:

For each machine we use the following configuration:

CoffeeMiner, Code analysis

First of all, you need to understand how Mitm Atak is carried out.

«В компьютерных сетях ARP-spoofing (ARP cache poisoning или ARP poison routing) — это техника, когда злоумышленник отправляет в локальную сеть (поддельные) сообщения по протоколу Address Resolution Protocol (ARP). В общем, цель состоит в связывании MAC-адреса злоумышленника с IP-адресом другого хоста, такого как шлюз по умолчанию, так что любой трафик для данного IP-адреса будет вместо этого направлен злоумышленнику».

To carry out the ARP-Spoofing attack, we will use the DSNIFF library.

Arpspoof.I Interface.T IPVICTIM IPGATEWAY ARPSPOOF.I Interface.T IPGATEWAY IPVICTIM

Free hidden miner Monero Cpugpu

Discussion of the process of searching for new blocks for a chain of transactions in cryptocurrency networks. Mining, as an emission of koins of various cryptocurrencies. Discussion of collective mining services.

Tired of the bolds of SFX-s, so I lay out my assembly unprinciply

I present you 2 miner options 1. Minit only on CPU, Auto Determination of architecture 32-bit/64-bit, is prescribed in the auto loading. 2. Minit on CPU and GPU, Auto Determination of the architecture 32-bit/64-bit for CPU, miner on the video card of Auto Determination of NVIDIA/AMD, is prescribed in auto loading.

Setting up the CPU miner: unpack the archive and edit 2 files in the text editor Config32.Json Config64.Json is changed to our Pool and wallet if minute on minergate.COM, instead of a wallet we prescribe our e-mail. You don’t need to change anything else. Next, press the right mouse button to the Minercpu file.exe and click open in Winrar.(It is important to click exactly to open it in Winrar, and not to open, otherwise install it for yourself) We throw the edited config32 there.Json and Config64.Json. All miner is ready.

Setting up the CPU and GPU miner: unpack the archive and edit 4 files in the text editor Config32.Json Config64.Json Configamd.Json Confignvidia.Json is changed to our Pool and wallet if minute on minergate.COM, instead of a wallet we prescribe our e-mail. You don’t need to change anything else. Next, press the right mouse button to the miner_cpu_gpu file.exe and click open in Winrar.(It is important to click exactly to open it in Winrar, and not to open, otherwise install it for yourself) We throw the edited config32 there.Json, config64.Json, configamd.Json and Confignvidia.Json. All miner is ready.

The miner is tired by two clicks on the Minercpu file.Exe or miner_cpu_gpu.exe, after installing Minercpu files.Exe and miner_cpu_gpu.EXE can be removed.

You can change the name of the miner and the icon as you like, you can only change the rest if you understand otherwise, you bring the miner in non.operation.

Since the miner on the video card greatly loads the system for fearlessness only after 10 minutes of the user inaction and turns off when the mouse moves or press the key on the keyboard. After disconnecting, it automatically starts again after 10 minutes of user inaction.

How to configure PC for cryptocurrency mining

PC setting for mining is only reduced to turn off all unnecessary applications, turn off the sleeping mode and set the profile of high performance. And also take care of cooling the video card and a stable wired Internet. About everything in order.

Turn off all unnecessary applications

Press the launch with the right mouse button, and select “Applications and Opportunities”. Next, go to the “Automobile” tab and turn off all the applications you unnecessary. Such as: Cortana, One Drive, Your Phone and others. Applications and opportunities. Automatic load

Turn off the sleeping mode

We move to the “control panel”, look for “power supply” and go to “Setting up the display shutdown”. Turn off the sleeping mode

In the field “Computer transfer to sleep mode:” we never put.

Put the profile “High performance”

We move to the “control panel”, look for “power supply” and set the “high performance” profile. Profile “High performance”

About how to minute on Rave OS, or to minute on Hive OS, read on our website.

I think there is more question if you can not minimize the house PC, it remains only to understand what will happen to the video card after mining.

How mining affects PC

The only influence of mining on your PC will be that the computer will constantly work, so take care that the components inside the case do not overheat, if necessary, open the lid. That’s all the influence of mining on PC.

With prolonged mining, video cards lose their performance and fan operation is disturbed. But this only happens if the map is minute 1.5-2 years continuously. If you intend to minute several months, there will be no influence.

How to find a mining program on a computer

The very first illegal program should be detected by antivirus. But, when using a hacker of advanced programs that automatically carry out training and add a miner to the list of trusted ones, this may not work.

Checking the computer for mining virus can be more reliable if you load the operating system from another, clean media, and start a good antivirus with updated databases in a deliberately clean environment. It is desirable to perform this procedure with some frequency, even if you are sure of the absence of miners, to search for Trojans and spy modules on a computer.

Hidden programs using a computer for mining can be determined by a number of signs. They do not necessarily indicate the presence of a hidden miner, but by the totality of signs they will help to better understand if everything is in order with PC:

  • The increased load on the computer during mining greatly slows down his work, it hangs;
  • Computer equipment consumes more electricity, heavily heats up, and its cooling system is constantly working in maximum mode;
  • Most of the space on the media disappears, from several gigabytes and above, and the access indicator to the hard drive shows its constant activity;
  • The computer constantly exchanges data with the Internet, even if no one uses it. Independent drain of traffic by a computer.
  • During the loading of the computer, the windows of incomprehensible programs appear and disappear briefly and disappear.

How to protect yourself from installing hidden miners

It is impossible to completely exclude the penetration of viruses on a computer, especially if the user regularly downloads unverified content and enters dubious sites.

To reduce the risk of viruses, carefully see what you download and install files on your PC. If the browser warns that the site may contain threats, then you should not enter it.

If the system unexpectedly began to work more slowly, check through the “dispatcher of the tasks”, as described in detail above. Doubtful programs will be more reliable to delete.

Constantly update the antivirus. Attackers improve their harmful programs.

How much mining the farm on PC for a month brings

Of course, specific numbers can be seen only accurately knowing the parameters of the computer, the cost of electricity, as well as evaluating all the nuances of the chosen crypto active. The approximate payback time of your equipment can be found on the Whattomine service. You can also evaluate the possible profit using a calculator on the Nicehash website. And then, the final indicators can change almost instantly-at least due to the volatility of the course.

Mining on a computer in 2021: where can you spend coins

It turned out to steal cryptocurrency at home PC? Congratulations! Now you have several options for the way:

  • The coins obtained can be left in a cryptocurrency for short.term or long.term investments (who knows when the course of your altcoin decides to jump up);
  • Pay for goods or services received coins;
  • bring assets to the exchange you like, exchange there for coins or tokens that will not be able to roll at home;
  • exchange assets for fiat.

When drawing conclusions, we can say that mining on PC in 2021 is real. But it is only worthwhile to understand that this option will not bring space profit, and the existing technical characteristics of the computer must correspond to a certain level. Be sure to use special calculators to understand if your capacities will have enough income. Also note that only altcoins will be obtained. Bitcoin at home PC no one is already mining, except that there are services, the same Nicehash that pay a reward in top cryptocurrency.

Is it possible to realize a self-playing hidden virner virus?

Greetings everyone. I heard and many times saw hidden miners written on high yap. As a rule, they are written on C.Its essence is to sew the finished exe miner with the finished program and distribute it. The problem of this method is that this infected program must be distributed to yourself. Therefore, I wondered: is it possible to write at a low level (si and ASM) a hidden virner virin, which will distribute itself by mail or through a local network and subsequently insert its code into primitive programs?

Only recently one “hacker” here on the 272nd article suggested, and here the 273rd came in handy! 🙂

Criminal Code Article 273. Creation, use and distribution of malicious computer programs (in am. Federal Law of 07.12.2011 N 420-ФЗ)

Creation, distribution or use of computer programs or other computer information, obviously intended for unauthorized destruction, blocking, modification, copying computer information or neutralizing computer information protection tools. It is punishable by restriction of freedom for up to four years, or forced labor for up to four years, or by imprisonment for the same period with a fine of up to two hundred thousand or in the amount of wages or other income of the convicted person up to eighteen months. 2. The acts provided for in the first part of this article, committed by a group of persons by prior conspiracy or organized group or person using their official position, as well as causing major damage or committed from selfish interest. It is punishable by restriction of freedom for up to four years, or forced labor for up to five years with deprivation of the right to occupy certain positions or engage in certain activities for up to three years or without it, or by imprisonment for up to five years with a fine of one hundred years thousands of up to two hundred thousand or in the amount of wages or other income of the convicted person for a period from two to three years or without the deprivation of the right to occupy certain positions or engage in certain activities for up to three years or without such. 3. Acts provided for by parts of the first or second of this article, if they entailed grave consequences or posed a threat of their onset. punished by deprivation of liberty for up to seven years.

Mining prevention methods

So, the ways to protect against mainers are not so complicated. Here they are:

  • installation and adequate configuration of antivirus;
  • track atypical Windows warnings;
  • use a plugin blocking scripts on web pages;
  • use browsers that have built-in protection against mainer viruses;
  • do not sow on pirate sites and any resources with a doubtful m.

Resources with a dubious m. this is not only news like “shock! How to legally write off debts with soda ”, but also sites that require confirm the collection of cookies-and redirecting somewhere at this moment or launching any script. And this happens, it is better to switch to the “bright” side of the Internet.

As for the browsers, Opera is working against miners and even somewhat annoying Yandex.A browser, inclined to start independently in the system when turned on like viruses.

Anti-script plugins today is already well familiar to many Adblock and Noscript. The developers are working on their functionality not only in terms of cutting out of annoying advertising, but also other malicious scripts.

Important: when it comes to the use of antiviruses against mainers, you should ensure that the antivirus performs its functions in full. Most often for this it is necessary to update the antivirus in time and set it up.

Whether antivirus will help against miners

Theoretically, antivirus can help cope with third.party miners. But in practice, many users note that the antivirus in such a situation is useless. And on, that is, its own reason is that the antivirus earns the right way, it must be configured. For example, even such a non.inhabitant antivirus as Avast can help in the fight against miners.

Why I Removed the World

To actualize the settings, it is necessary to make this way: settings. general. enable the enhanced mode. It is also necessary to indicate with a tick the item “Search for potentially undesirable programs”. The miner just falls into the category of potentially undesirable programs.

It is also necessary to go to the antivirus tab called “Protection”, here it is worth activating all three options proposed by the program in the “Basic Protection Components” tab.

Viruses. miners. this is a reality that has captured the world in the same way as the mining epidemic did. To deal with the potential threat of your PC, as well as guaranteed to detect it, it is only worth performing a number of simple recommendations like setting up antivirus.