AsyncRAT – Active IOCs
October 27, 2025SideWinder APT Group aka Rattlesnake Targeting Pakistan – Active IOCs
October 27, 2025AsyncRAT – Active IOCs
October 27, 2025SideWinder APT Group aka Rattlesnake Targeting Pakistan – Active IOCs
October 27, 2025Severity
High
Analysis Summary
CoinMiner is a malware designed to secretly mine cryptocurrencies, such as Bitcoin, on infected computers. The malware is typically spread through email attachments, malicious websites, or software downloads, and can infect both personal and business computers.
Once installed, CoinMiner malware will use the computer's processing power to solve complex mathematical algorithms and earn cryptocurrency for the hackers who created the malware. This can slow down the infected computer and cause it to overheat, potentially causing damage to the hardware.
CoinMiner malware is often difficult to detect because it is designed to run quietly in the background without drawing attention to itself. However, there are some signs that your computer may be infected with CoinMiner malware, including:
- Sluggish performance
- Increased CPU usage
- Overheating
- Fans running at a high speed
- Increased electricity bills
To prevent CoinMiner malware and other types of malware from infecting your computer, it's important to keep your operating system and antivirus software up to date, avoid downloading software or opening email attachments from unknown sources, and be cautious when visiting unfamiliar websites.
Impact
- Financial Loss
- Hardware Damage
- Data Loss
Indicators of Compromise
MD5
7fe370b603670211186cd199f5dfe524
187e6746f347ee2a8372a5ba991ad58d
d62b80f2de3d5d16b3675ada84f2fea2
SHA-256
2a40ec0c40986aff7080ef66354d9029451e83101df44c63c0b526812c0a5598
f985ab3cd12c5abf919ceb61a40444cf072cf2ed5ec41698d3ba15fbb888d908
6b5d0257a8a849f6b7c4a572570a8769d15e2f6eefe3b2d035a1a176c37462e6
SHA1
d5a692c0595ebcebca818e9578406e84cb9371d9
6f38db7f95285c9d184c2d501c746b44ab36eae2
b82d6bd4acc771bc65191522fe6c4d0babce1c26
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- In addition, users can also consider using ad-blockers and disabling JavaScript in their web browsers to reduce the risk of drive-by downloads of CoinMiner malware.