

FormBook Malware – Active IOCs
January 16, 2025
Multiple Fortinet Products Vulnerabilities
January 16, 2025
FormBook Malware – Active IOCs
January 16, 2025
Multiple Fortinet Products Vulnerabilities
January 16, 2025Severity
High
Analysis Summary
CoinMiner is a malware designed to secretly mine cryptocurrencies, such as Bitcoin, on infected computers. The malware is typically spread through email attachments, malicious websites, or software downloads, and can infect both personal and business computers.
Once installed, CoinMiner malware will use the computer's processing power to solve complex mathematical algorithms and earn cryptocurrency for the hackers who created the malware. This can slow down the infected computer and cause it to overheat, potentially causing damage to the hardware.
CoinMiner malware is often difficult to detect because it is designed to run quietly in the background without drawing attention to itself. However, there are some signs that your computer may be infected with CoinMiner malware, including:
- Sluggish performance
- Increased CPU usage
- Overheating
- Fans running at a high speed
- Increased electricity bills
To prevent CoinMiner malware and other types of malware from infecting your computer, it's important to keep your operating system and antivirus software up to date, avoid downloading software or opening email attachments from unknown sources, and be cautious when visiting unfamiliar websites.
Impact
- Financial Loss
- Hardware Damage
- Data Loss
Indicators of Compromise
MD5
e8a551e4a30da99f8928cd774650fb85
1810d92c04be1fd0bc37f09d48303e30
b006ab3a8d8650695338fc8d728d7463
5753f74ee930237fc92f8ffab8a23f24
SHA-256
bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba
3e02e818c19fdabc8342730460530f243dd47da5be9c89e0cd3c86dcea937ed3
28653f74aafbb20478366f04d5e11da836eda0a3ab25d851d56d4bd1bbff4f99
ad8bae6ea4ae84c16b038dde8128290d7dfc6a44b477bff0d96450f931d6ff95
SHA1
621a801e8da1e851c48862d5300356581962c26e
48300ea7ae065d82d69348c9de4a69d867ee6d0b
46f51ac1238387676a8f4131a021b95baa64e49c
82f8ec72dc467918163343f4418237d0fe895e37
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- In addition, users can also consider using ad-blockers and disabling JavaScript in their web browsers to reduce the risk of drive-by downloads of CoinMiner malware.