F5F Stay Refreshed Software Operating Systems Eliminando el malware de minería de criptomonedas

Eliminando el malware de minería de criptomonedas

Eliminando el malware de minería de criptomonedas

D
DarkGodSlayer
Junior Member
12
09-15-2016, 03:15 AM
#1
I once observed my CPU performing better when Task Manager or Resource Monitor was active. A discussion was started, and it was advised that the issue might stem from background processes. However, I remained concerned due to unusually high power usage. Someone recommended using Process Lasso, which confirmed the malware wasn’t detected or closing properly—something was consuming about 30% CPU in cmd.exe. HWiNFO and other tools displayed 32% CPU usage, with full utilization on the first ten cores of both processors. When I opened resmon or Task Manager, the load vanished instantly. Within ten seconds, the CPU returned to around 30%. I’ve tried Defender, Malwarebytes, Avast Free, Kaspersky, and Bitdefender—none found anything. Removing cmd.exe wouldn’t be feasible, as it’s essential for system functions. I’m considering a full Windows reinstall, but there are many drives and network shares involved. I can’t simply wipe everything off. Without any antivirus alerts, it seems the malware is quite stealthy. It appears this behavior spreads easily across devices on the same network. I’m at my limits—please offer guidance. Windows 10 x64, latest update needed.
D
DarkGodSlayer
09-15-2016, 03:15 AM #1

I once observed my CPU performing better when Task Manager or Resource Monitor was active. A discussion was started, and it was advised that the issue might stem from background processes. However, I remained concerned due to unusually high power usage. Someone recommended using Process Lasso, which confirmed the malware wasn’t detected or closing properly—something was consuming about 30% CPU in cmd.exe. HWiNFO and other tools displayed 32% CPU usage, with full utilization on the first ten cores of both processors. When I opened resmon or Task Manager, the load vanished instantly. Within ten seconds, the CPU returned to around 30%. I’ve tried Defender, Malwarebytes, Avast Free, Kaspersky, and Bitdefender—none found anything. Removing cmd.exe wouldn’t be feasible, as it’s essential for system functions. I’m considering a full Windows reinstall, but there are many drives and network shares involved. I can’t simply wipe everything off. Without any antivirus alerts, it seems the malware is quite stealthy. It appears this behavior spreads easily across devices on the same network. I’m at my limits—please offer guidance. Windows 10 x64, latest update needed.

T
Tico_32
Senior Member
680
09-15-2016, 11:56 AM
#2
You need a Sysrescuecd image, boot into Linux, then execute ClamAV and RKHunter. Install them if necessary. Verify their signature files before scanning. Stay offline after removing the malware, repeat on all other devices in your network. After clearing all traces, make it a routine to run these tools. [edit] RKHunter appears outdated; consider checking https://github.com/rfxn/linux-malware-detect. No guarantees provided!
T
Tico_32
09-15-2016, 11:56 AM #2

You need a Sysrescuecd image, boot into Linux, then execute ClamAV and RKHunter. Install them if necessary. Verify their signature files before scanning. Stay offline after removing the malware, repeat on all other devices in your network. After clearing all traces, make it a routine to run these tools. [edit] RKHunter appears outdated; consider checking https://github.com/rfxn/linux-malware-detect. No guarantees provided!

E
EnderTwisted
Junior Member
6
09-15-2016, 07:11 PM
#3
Does it display the command-line parameters? That would essentially reveal its origin. As usual, I suggest using Autoruns to examine startup items.
E
EnderTwisted
09-15-2016, 07:11 PM #3

Does it display the command-line parameters? That would essentially reveal its origin. As usual, I suggest using Autoruns to examine startup items.

R
RaiZer_
Member
203
09-15-2016, 07:32 PM
#4
Use Process Explorer and activate cmd line or full path to locate the executable or script.
R
RaiZer_
09-15-2016, 07:32 PM #4

Use Process Explorer and activate cmd line or full path to locate the executable or script.

M
minestine7
Junior Member
13
09-15-2016, 09:20 PM
#5
It avoids showing up in process explorer and exits after opening. Further investigation suggests it matches the same malware found at the provided Microsoft link. Removing it using the suggested tools and creating a custom patch file are being considered.
M
minestine7
09-15-2016, 09:20 PM #5

It avoids showing up in process explorer and exits after opening. Further investigation suggests it matches the same malware found at the provided Microsoft link. Removing it using the suggested tools and creating a custom patch file are being considered.

L
lokapso_SP
Member
77
09-17-2016, 12:56 AM
#6
I’d run a command to list processes since malware often exploits CMD. That way, it won’t terminate itself. You’ve already discovered the solution—great job!
L
lokapso_SP
09-17-2016, 12:56 AM #6

I’d run a command to list processes since malware often exploits CMD. That way, it won’t terminate itself. You’ve already discovered the solution—great job!

J
jak8544
Junior Member
42
09-18-2016, 06:56 AM
#7
I've tested several antivirus and antimalware solutions. Malwarebytes has been reliable for years, identifying crypto-mining threats on multiple machines, especially when other programs missed them. If you haven't tried it, give it a go. Otherwise, if it doesn’t detect anything, consider backing up important files and performing a clean install after wiping the drives to ensure complete removal.
J
jak8544
09-18-2016, 06:56 AM #7

I've tested several antivirus and antimalware solutions. Malwarebytes has been reliable for years, identifying crypto-mining threats on multiple machines, especially when other programs missed them. If you haven't tried it, give it a go. Otherwise, if it doesn’t detect anything, consider backing up important files and performing a clean install after wiping the drives to ensure complete removal.

S
SurviveMiner
Member
191
09-18-2016, 07:14 AM
#8
So far, I think I've located the malware. I've been waiting a long time for the offline scan to complete before I can return to Windows and eliminate it.
S
SurviveMiner
09-18-2016, 07:14 AM #8

So far, I think I've located the malware. I've been waiting a long time for the offline scan to complete before I can return to Windows and eliminate it.

P
privy223
Member
115
09-27-2016, 01:27 PM
#9
Download Sysinternal Autorun, then verify for unusual items. Run in safe mode if it blocks opening Autorun.
P
privy223
09-27-2016, 01:27 PM #9

Download Sysinternal Autorun, then verify for unusual items. Run in safe mode if it blocks opening Autorun.

M
matdu07
Junior Member
14
09-27-2016, 04:34 PM
#10
The documents were hidden in C:/ProgramData/Coresys64, pretending to be ordinary Windows files. A tool named DoesNotBelong (Furtivex) relocated them to a quarantine folder under the root directory and let me remove all of them. This was the sole antivirus that successfully located and deleted the miner; none of the popular ones worked. It also scanned the registry and C: drive, removing unwanted items. I strongly suggest using it for anyone facing this problem in the future.
M
matdu07
09-27-2016, 04:34 PM #10

The documents were hidden in C:/ProgramData/Coresys64, pretending to be ordinary Windows files. A tool named DoesNotBelong (Furtivex) relocated them to a quarantine folder under the root directory and let me remove all of them. This was the sole antivirus that successfully located and deleted the miner; none of the popular ones worked. It also scanned the registry and C: drive, removing unwanted items. I strongly suggest using it for anyone facing this problem in the future.