user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Win64/CoinMiner.SLPP!MTB
Trojan:Win64/CoinMiner.SLPP!MTB - Windows Defender threat signature analysis

Trojan:Win64/CoinMiner.SLPP!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Win64/CoinMiner.SLPP!MTB
Classification:
Type:Trojan
Platform:Win64
Family:CoinMiner
Detection Type:Concrete
Known malware family with identified signatures
Variant:SLPP
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family CoinMiner

Summary:

This is a Trojan CoinMiner that uses the infected system's resources to mine cryptocurrency, causing significant performance degradation. The malware uses advanced evasion techniques, including process hooking and the abuse of legitimate Windows tools (LOLBins) like PowerShell and Rundll32, to establish persistence and execute its payload.

Severity:
Medium
VDM Static Detection:
Relevant strings associated with this threat:
 - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
 - rundll32 (PEHSTR_EXT)
 - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
 - !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
 - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Known malware which is associated with this threat:
Filename: xQ4gNK9auvFo4.exe
9e072e908725c84d710311124cbb82f59ca5ef5658014385e8fde7237cfee983
22/11/2025
7659aa27e4d739a3e1d9a1e2a4aa8b3b3bfad2459eba45ae411b532d44f92379
08/11/2025
Remediation Steps:
Isolate the endpoint from the network to prevent lateral movement. Use Windows Defender to perform a full system scan and remove the detected files. Manually investigate and remove persistence mechanisms, such as suspicious Scheduled Tasks and startup entries, and reset all user and administrator passwords on the machine.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 07/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$