cpuminer-x86.exe

cpuminer

LLC TRK

The application cpuminer-x86.exe by LLC TRK has been detected as a potentially unwanted program by 17 anti-malware scanners. This is a malicious Bitcoin miner. Bitcoin-mining malware is designed to force computers to generate Bitcoins for cybercriminals' use and consumes computing power. While running, it connects to the Internet address livingston.shortysmalls.biz on port 3200.
Publisher:
LLC TRK   (signed and verified)

Product:
cpuminer

Version:
1.1

MD5:
5f535ed87b7c45586c71480ed27ab1aa

SHA-1:
4a4544ba2ab7058c4ee1ebfdfc72b2dec09bbc0c

SHA-256:
0d856e37d6bace64472056f48ad835d2192a4b5693e50ef4955d765d786e6572

Scanner detections:
17 / 68

Status:
Potentially unwanted

Explanation:
The program will mine for BitCoins using the computer's GPU in the background and may be installed and run without the user's knowledge.

Analysis date:
11/24/2024 3:08:57 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.87902
5751583

Avira AntiVirus
TR/BitCoinMiner.2410280
8.3.1.6

Arcabit
Trojan.Strictor.D1575E
1.0.0.425

Baidu Antivirus
Hacktool.Win32.BitCoinMiner
4.0.3.15611

Bitdefender
Gen:Variant.Strictor.87902
1.0.20.810

Emsisoft Anti-Malware
Gen:Variant.Strictor.87902
10.0.0.5366

ESET NOD32
Win32/BitCoinMiner.BY potentially unsafe application
7.0.302.0

F-Secure
Gen:Variant.Strictor.87902
5.14.151

G Data
Gen:Variant.Strictor.87902
15.6.25

IKARUS anti.virus
Trojan.BitCoinMiner
t3scan.1.9.5.0

K7 AntiVirus
Unwanted-Program
13.205.16216

MicroWorld eScan
Gen:Variant.Strictor.87902
16.0.0.486

Norman
Gen:Variant.Strictor.87902
02.06.2015 14:23:46

Panda Antivirus
Trj/Genetic.gen
15.06.11.03

Qihoo 360 Security
Win32/Trojan.146
1.0.0.1015

Reason Heuristics
PUP.BitcoinMiner.TRK.Meta
15.6.11.11

VIPRE Antivirus
Threat.4150696
40828

File size:
2.3 MB (2,410,272 bytes)

Product version:
1.1

Copyright:
Copyright (C) 2015

File type:
Executable application (Win32 EXE)

Common path:
C:\Windows\System32\cpuminer-x86.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
5/27/2015 9:00:00 AM

Valid to:
5/27/2016 8:59:59 AM

Subject:
CN="LLC TRK ""Alternatyva """, O="LLC TRK ""Alternatyva """, STREET="Miru str., 15", L=Borova, S=Kharkivska, PostalCode=63801, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00FC59307F6203B2A63C0BAC134F369BD7

File PE Metadata
Compilation timestamp:
6/4/2015 1:14:25 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
12.0

CTPH (ssdeep):
49152:5hp8AxedRCsxJe3NLDj0fXZCmBz5YGhrGMI+TM3RPAmHq8+i:LpsdRCsDaNLDjgJCJ3+m/

Entry address:
0x17DD01

Entry point:
E8, 7B, 02, 00, 00, E9, 91, FE, FF, FF, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB...
 
[+]

Entropy:
6.9829

Code size:
1.5 MB (1,562,112 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP:
Connects to livingston.shortysmalls.biz  (66.117.6.3:3200)

Remove cpuminer-x86.exe - Powered by Reason Core Security