CoinMiner Detected
Detects cryptocurrency mining malware in AhnLab EPP V3 malware alert logs.
Query
The AhnLab V3 antivirus engine detects cryptocurrency mining malware with signatures such as CoinMiner/Win.PhoenixMiner.R263897, CoinMiner/Win.Generic.C5729394, etc.
Therefore, alerts are extracted when the signature value begins with CoinMiner/.
Message
- AhnLab EPP V3 Cryptocurrency Mining Malware Detected: Host $host_ip, Malware $signature
Field Order
- _log_time, hostname, host_ip, emp_name, dept_name, signature, file_path, file_status, md5
Threat Analysis
- Cryptocurrency mining malware consumes system resources for extended periods, causing high CPU/GPU usage, degraded performance, and increased power consumption.
- Attackers may install mining software by exploiting vulnerabilities or using compromised accounts, hijacking organizational resources for unauthorized mining activities.
- Some mining malware includes additional capabilities such as downloading secondary payloads, installing backdoors, or self-updating, potentially leading to further compromise.
False Positives
-
Detections may occur when cryptocurrency mining programs are operated internally or executed for research purposes.
- If the activity is authorized, the endpoint’s IP address can be added as an exception.
Response Actions
- Check the endpoint’s CPU/GPU utilization and network traffic patterns to determine whether mining activity actually occurred.
- Review the execution path, installation traces, and auto-start registry entries of the mining program, and remove any malicious components.
- Verify whether similar detections have occurred within the same network segment to identify potential lateral spread.
- Investigate the infection vector (vulnerability exploitation, weak passwords, exposed RDP services, etc.) and strengthen system patching, account security, and access control policies.
MITRE ATT&CK
- Tactic
- Impact
- Technique
- Name: Resource Hijacking
- ID: T1496
- Reference URL: https://attack.mitre.org/techniques/T1496/