Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family SilentCryptoMiner
Trojan:Win64/SilentCryptoMiner is a sophisticated trojan designed to covertly mine cryptocurrency on infected 64-bit Windows systems. It employs a wide array of evasion and persistence techniques, including abusing legitimate system utilities like mshta, rundll32, regsvr32, BITS, and PowerShell, as well as process hooking and scheduled tasks, to maintain stealth and ensure continuous operation while draining system resources.
Relevant strings associated with this threat: - Release\Silent Crypto Miner Builder.pdb (PEHSTR_EXT) - SilentCryptoMiner.AlgorithmSelection.resources (PEHSTR_EXT) - Reoxggyzhux.Properties.Resources.resources (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
00a16089397d26dec07ba75d5ac027fba40482e0af441942d8de1475aa133aabImmediately isolate the infected system and perform a full system scan with updated antivirus software to remove all detected components. Manually verify and remove any persistent entries in scheduled tasks, startup folders, or registry, then patch all software and strengthen endpoint security configurations to prevent re-infection.