

Hackers Actively Exploiting Windows NTLM Spoofing Vulnerability to Compromise Systems – Active IOCs
April 16, 2025
ICS: Multiple Rockwell Automation ThinManager Vulnerabilities
April 16, 2025
Hackers Actively Exploiting Windows NTLM Spoofing Vulnerability to Compromise Systems – Active IOCs
April 16, 2025
ICS: Multiple Rockwell Automation ThinManager Vulnerabilities
April 16, 2025Severity
High
Analysis Summary
CoinMiner is a malware designed to secretly mine cryptocurrencies, such as Bitcoin, on infected computers. The malware is typically spread through email attachments, malicious websites, or software downloads, and can infect both personal and business computers.
Once installed, CoinMiner malware will use the computer's processing power to solve complex mathematical algorithms and earn cryptocurrency for the hackers who created the malware. This can slow down the infected computer and cause it to overheat, potentially causing damage to the hardware.
CoinMiner malware is often difficult to detect because it is designed to run quietly in the background without drawing attention to itself. However, there are some signs that your computer may be infected with CoinMiner malware, including:
- Sluggish performance
- Increased CPU usage
- Overheating
- Fans running at a high speed
- Increased electricity bills
To prevent CoinMiner malware and other types of malware from infecting your computer, it's important to keep your operating system and antivirus software up to date, avoid downloading software or opening email attachments from unknown sources, and be cautious when visiting unfamiliar websites.
Impact
- Financial Loss
- Hardware Damage
- Data Loss
Indicators of Compromise
MD5
bba1a5dccb06646bdec1e7ae8eb32ff6
8b4151d7083f5565ab488c69dfa241af
bde60847f3e50ff0ce270703ec365dc6
3442c0548fa7d0d6704e8554c24ba8d0
SHA-256
473da87f8cd4614a6fc14e7496be635ccf2b1cb4a909824a4606fea01221c2ae
10bf4461950594388ae0baa88d9ae76437a0db9441b0943be926afd06180384d
d4f7947cd9477ce8161e3b24b7a723de0322af6c1a1797b97f5144687d75ee27
b2fee10f43ec169e0110c48858ae2527f0a490045fafea595220ce3339555a8f
SHA1
f802a3d67b3237a516e7b2ebbda3936a3bde4916
e9b5796063ad28b81b19b1ba82c9a98a6c033308
72be0cf6f1c692afba7b7c85577edbd7dbbffe55
df053d0b5a047fe1feae457e57e03147438dd876
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- In addition, users can also consider using ad-blockers and disabling JavaScript in their web browsers to reduce the risk of drive-by downloads of CoinMiner malware.