Silent ETH Miner Builder: Malware analysis

Author: Fabio Pensa

In this analysis it has been taken into consideration the builder of a Silent ETH Miner sample, which
performs mining operations and it does “process masking” techniques by pointing to terminate some
specific processes which, as we will see next, are related to Process Explorer, Process Hacker, Task
Manager and Performance Monitor (to render more difficult the research of the issue of CPU spikes
problem that is generated by the execution of the threat).

To know more:

Report: DarkWeb Analysis 2022
Malware analysis: Babuk Ransomware (mathematical curve analysis)

Cyber Incident Swascan Emergency

Contact us for immediate support

The undersigned, as data subject, DECLARES that I have read and understood the content of the privacy policy pursuant to Article 13, GDPR. AGREE to the processing of data in relation to the sending by the Data Controller of commercial and / or promotional communications relating to (i) own products / services, or (ii) products / services offered by third parties.
The consent given may be revoked at any time by contacting the Data Controller at the addresses provided in the aforementioned privacy policy.