cpuminer-gw64.exe

LLC

The application cpuminer-gw64.exe by LLC has been detected as adware by 6 anti-malware scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘cpuminer’. This is a malicious Bitcoin miner. Bitcoin-mining malware is designed to force computers to generate Bitcoins for cybercriminals' use and consumes computing power.
Publisher:
LLC   (signed and verified)

MD5:
6d3490c76d37c950cfa18c414972e98c

SHA-1:
bf2b8230d7b658577ab8c91f8cd8c55edf501a11

SHA-256:
20b09d34f760ae8633b325712638e6f6aabe4ac10ea9fffa3d89f95aa6bb5fdd

Scanner detections:
6 / 68

Status:
Adware

Explanation:
The program will mine for BitCoins using the computer's GPU in the background and may be installed and run without the user's knowledge.

Analysis date:
11/24/2024 10:46:21 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Miner-B [PUP]
2014.9-150823

Baidu Antivirus
Hacktool.Win64.BitCoinMiner
4.0.3.15823

Dr.Web
Trojan.BtcMine.711
9.0.1.0255

ESET NOD32
Win64/BitCoinMiner.AP potentially unsafe (variant)
9.12135

IKARUS anti.virus
not-a-virus:RiskTool.BitCoinMiner
t3scan.1.9.5.0

Reason Heuristics
PUP.Amonitize (M)
15.8.23.4

File size:
4.1 MB (4,268,712 bytes)

File type:
Executable application (Win64 EXE)

Common path:
C:\Windows\System32\cpuminer-gw64.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
5/26/2015 7:00:00 AM

Valid to:
5/26/2016 6:59:59 AM

Subject:
CN="LLC ""Soft Lending Grup""", O="LLC ""Soft Lending Grup""", STREET="Str. Patrice Lumumba, 4/6", L=Kiev, S=Kiev, PostalCode=01042, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00DB38AB5E9FF3E53AA97E4B4D6DCD7366

File PE Metadata
Compilation timestamp:
7/9/1971 3:43:52 AM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows Console

Linker version:
2.24

CTPH (ssdeep):
49152:VyLaxzMtQc6m3KP6LJHVUTxuBZxvSujpUYAPwTrgPjYc8rzhTiLpfEomeM0iqScW:z/P4HV2xRir8Eueo5M0iqSckSD26EEU

Entry address:
0x14D0

Entry point:
48, 83, EC, 28, C7, 05, 82, F3, 37, 00, 00, 00, 00, 00, E8, 6D, C8, 28, 00, E8, 98, FC, FF, FF, 90, 90, 48, 83, C4, 28, C3, 90, 48, 83, EC, 38, 4C, 89, 4C, 24, 58, 4C, 8D, 4C, 24, 58, 4C, 89, 4C, 24, 28, E8, 18, D4, 28, 00, 48, 83, C4, 38, C3, 0F, 1F, 00, 53, 48, 83, EC, 20, 89, CB, 85, C9, 74, 1D, FF, 15, E7, 25, 38, 00, 48, 8D, 15, D8, 5A, 2A, 00, 48, 8D, 48, 60, E8, 7F, A8, 10, 00, 89, D9, E8, 78, 2E, 29, 00, 48, 8D, 0D, C1, 77, 2A, 00, E8, 9C, A8, 10, 00, EB, EB, 66, 2E, 0F, 1F, 84, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.4914

Code size:
2.6 MB (2,704,896 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
cpuminer

Command:
C:\Windows\System32\cpuminer-gw64.exe


Remove cpuminer-gw64.exe - Powered by Reason Core Security