minerd.exe

The application minerd.exe has been detected as a potentially unwanted program by 16 anti-malware scanners. This is a malicious Bitcoin miner. Bitcoin-mining malware is designed to force computers to generate Bitcoins for cybercriminals' use and consumes computing power. While running, it connects to the Internet address 84-234-52-190.links.md on port 7915.
MD5:
ffb58739fe548755a0caba6493383909

SHA-1:
b9dd92ecd5b5f43ddbf91c456bd43fdb603479b1

SHA-256:
92433f2f9a562740d998297000694e2caaccd629f5c3c5e77dbca250435aef58

Scanner detections:
16 / 68

Status:
Potentially unwanted

Explanation:
The program will mine for BitCoins using the computer's GPU in the background and may be installed and run without the user's knowledge.

Analysis date:
11/23/2024 12:41:26 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Application.Heur2.mCW@bSPpFpbab
237

AhnLab V3 Security
PUP/Win32.BitCoinMiner
2016.06.11

Avira AntiVirus
TR/BitCoinMiner.rvzv
8.3.3.4

Arcabit
Application.Heur2.E0F45D
1.0.0.696

avast!
Multi:BitCoinMiner-A [Tool]
2014.9-160612

AVG
BitCoinMiner.D
2017.0.2715

Bitdefender
Gen:Application.Heur2.mCW@bSPpFpbab
1.0.20.820

ESET NOD32
Win32/BitCoinMiner.BV potentially unsafe (variant)
10.13628

F-Secure
Gen:Application.Heur2.mCW@bSPpFpbab
11.2016-12-06_1

G Data
Gen:Application.Heur2.mCW@bSPpFpbab
16.6.25

IKARUS anti.virus
Trojan.BitCoin
t3scan.2.0.9.0

Kaspersky
not-a-virus:HEUR:RiskTool.Win32.BitCoinMiner
14.0.0.69

Malwarebytes
Trojan.BitCoinMiner
v2016.06.12.04

MicroWorld eScan
Gen:Application.Heur2.mCW@bSPpFpbab
17.0.0.492

Qihoo 360 Security
HEUR/QVM20.1.0000.Malware.Gen
1.0.0.1120

Sophos
Bitcoin Miner (PUA)
4.98

File size:
193.5 KB (198,144 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\minerd.exe

File PE Metadata
Compilation timestamp:
6/10/2016 3:51:43 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
2.23

CTPH (ssdeep):
3072:eqbm0i97eeCvJom+2il7EbMvIiUF6bokMTXVWB4ZQsksF:xDQ7eeCvu79vIiUF6bV4Vks

Entry address:
0x14E0

Entry point:
83, EC, 0C, C7, 05, B4, 23, 43, 00, 00, 00, 00, 00, E8, 4E, 44, 02, 00, 83, C4, 0C, E9, 86, FC, FF, FF, 90, 90, 90, 90, 90, 90, A1, 20, D7, 42, 00, 85, C0, 74, 43, 55, 89, E5, 83, EC, 18, C7, 04, 24, 00, E0, 42, 00, FF, 15, E8, 42, 43, 00, BA, 00, 00, 00, 00, 83, EC, 04, 85, C0, 74, 16, C7, 44, 24, 04, 0E, E0, 42, 00, 89, 04, 24, FF, 15, EC, 42, 43, 00, 83, EC, 08, 89, C2, 85, D2, 74, 09, C7, 04, 24, 20, D7, 42, 00, FF, D2, C9, F3, C3, 66, 90, 55, 89, E5, 5D, C3, 90, 90, 90, 90, 90, 90, 90, 90, 90, 90, 90...
 
[+]

Entropy:
6.3704

Code size:
173 KB (177,152 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to mail.litecoinpool.org  (88.80.187.187:3333)

TCP:
Connects to li639-116.members.linode.com  (23.92.25.116:3333)

TCP:
Connects to 61.ip-158-69-196.net  (158.69.196.61:3333)

TCP:
Connects to 149-210-234-234.colo.transip.net  (149.210.234.234:3333)

TCP:
Connects to 84-234-52-190.links.md  (84.234.52.190:7915)

TCP:
Connects to hash-to-coins.com  (88.99.68.228:3333)

TCP:
Connects to fr-db1.suprnova.cc  (46.105.114.185:9995)

Remove minerd.exe - Powered by Reason Core Security