Author: Fabio Pensa
In this analysis it has been taken into consideration the builder of a Silent ETH Miner sample, which
performs mining operations and it does “process masking” techniques by pointing to terminate some
specific processes which, as we will see next, are related to Process Explorer, Process Hacker, Task
Manager and Performance Monitor (to render more difficult the research of the issue of CPU spikes
problem that is generated by the execution of the threat).
To know more: