Minergate

Threat Scorecard

Ranking: 2,909
Threat Level: 10 % (Normal)
Infected Computers: 31,668
First Seen: October 17, 2017
Last Seen: April 19, 2024
OS(es) Affected: Windows

Minergate is a generic detection name used in reference to a large family of cryptocurrency miners released in the last week of November 2017. The Minergate mining tools are programs based on the XMRig Trojan, which we covered in September 2017 and continued to record new variants in the following months. The Minergate mining software is delivered to PC users via fake software updates to Java, Adobe Flash, the Windows fonts repository, Google Chrome and Mozilla Firefox. We have recorded more than forty variants of the Minergate mining Trojans as of December 4th, 2017. Computer security analysts say that the rise in price for cryptocurrencies like Bitcoin, Monero, and Ethirium is likely to be a catalyst for the continuous development of Mining Trojans in 2018.

The strains of Minergate are slightly modified versions of the original program. The Minergate Trojans are designed to perform complex calculations and verify payments performed with Bitcoin, Monero, Dogecoin, Litecoin and Ethirium. The range of digital coins supported by Minergate may expand considering it is comparatively easy to obtain a copy of XMRig and modify it. AV companies are known to flag the objects associated with the Minergate wave of mining tools using detection names like — Trojan:Win64/CoinMiner, Trojan.Win32.Generic!BT, TR/CoinMiner.ME, JS:Miner-C, Win64:Rootkit-gen [Rtk], HEUR/Malware.QVM18.Gen, Win32:GenMalicious-HFA [Trj], PUP/Win64.BitCoinMiner.R190714, Unwanted-Program ( 004fc8691 ) and Trojan.Amonetize. The following process names might be displayed in the Task Manager of compromised systems:

Affada.exe, AppxadsulP.exe, Bot.exe, Cppredistx86.exe, Cpucheck.exe, DirectX11b.exe, Helper.exe, Image.exe, Install6.exe, Mess.exe, Msvc.exe, Musallat.exe, NVIDIA.exe, Nheqminer.exe, Nsgpucnminer.exe, Optimizer.exe, Sc.exe, Test.exe, Update_new.exe, VideoCardUpd, Vlngp1.exe, Windows-upt.exe, Wupdate.exe, XMgrenim.exe, Zcash.exe, minergate.exe, runhosts.exe, slmgr32.exe, svchostr.exe, synctask.exe, sysConfig.bat, uninstaller.exe, vnlgp.exe, winin1t.exe, Up.exe, Wniheuzori.exe, slove.exe, wuauclt.exe, Xmriig.exe, Vlngp1.exe, Platforms.exe, Xm86.exeVshub.exe, Svshost.exe, Zqeyx aaxo.exe, Nvdisplay.exe, Anydeskapp.exe, GEN.exe, Hjhdgshjef.exe, Svchose.exe, Qc64.exe, Duckgo.exe, Iconrdb.exe

You should note that the BlackHat hackers behind the Minergate Trojans are using file names associated with legitimate products like Nvidia Experience, CPU Check, svchost.exe, and Windows Update to minimize the risk of being detected by VAV tools. Even experienced users may not distinguish a fake one from a legitimate process when searching for the Minergate program. Tools like the Minergate, which are used to hijack system resources on remote computers can cause system instability, increased electricity bills and increased heat in the computer case. PC users are advised to use a trusted anti-malware scanner to find and eliminate the Minergate variants safely. The following folders are created by the Minergate malware, but they may be used by legitimate apps as well so that you should exercise caution:

C:\Program Files\G89CXYP6N9\
C:\Program Files\Internet Explorer\BCDNJTWLUX
C:\Program Files\jetstrmedia\netmedia
C:\ProgramData\AppxadsulP
C:\ProgramData\CupCheck
C:\ProgramData\DirectX11b
C:\ProgramData\Microsoft\DhcQ
C:\ProgramData\Natihial
C:\Users\\App Data\Local Low\Microsoft\
C:\Users\\App Data\Local Low\Microsoft\
C:\Users\\App Data\Local Low\Microsoft\Windows\System32\Recovery
C:\Users\\App Data\Local Low\Microsoft\directx11b
C:\Users\\App Data\Local Low\Microsoft\framework
C:\Users\\App Data\Local Low\Microsoft\microsoftcom
C:\Users\\App Data\Local Low\Microsoft\natihial
C:\Users\\App Data\Local Low\Microsoft\windowssql
C:\Users\\App Data\Local Low\SLMgr
C:\Users\\App Data\Local Low\wupdate
C:\Users\\App Data\Local\Optimizer
C:\Users\\App Data\Local\Temp
C:\Users\\App Data\Local\Temp\1400.tmp
C:\Users\\App Data\Microsoft\Windows
C:\Users\\App Data\Roaming\FastCh
C:\Users\\App Data\Roaming\Server\
C:\Users\\App Data\Roaming\Windows_x64_nhqeminer-5c
C:\Users\\App Data\Roaming\bodor
C:\Users\\App Data\Roaming\images
C:\Users\\App Data\Roaming\vnlgp\vnlgp
C:\Users\\App Data\Roaming\xmgcach
C:\Users\\App Data\Roaming\xmgcash
C:\Users\\App Data\VideoCardUpdater\
C:\Windows\Temp\6E34.tmp\
C:\Windows\slove\
C:\Winsys\
C:\Program Files\29044DMFYR\
C:\Program Files\ALQNKUM7O1
C:\Program Files\Client\
C:\Program Files\HPLion
C:\Program Files\Microleaves\Online Application\Version 2.6.0\
C:\Users||AppData\Roaming\HWmonitorApp
C:\Windows\Microsoft\Svchost.exe.update
C:\Windows\Windows\9473a2fafe204da49741664f96907b44
C:\Windows\dsp

AppData\AnyDeskApp
AppData\CloudPrinter
AppData\Codec
AppData\Interl Management
AppData\Local\GenericTools
AppData\Local\Programs\Gen
AppData\Local\Temp\is-2PMDK.tmp
AppData\Roaming\AGData\bin
AppData\Roaming\HWmonitorApp
AppData\Ronzap
C:\Windows
C:\Windows\Microsoft\Svchost.exe.update
C:\Windows\Windows\9473a2fafe204da49741664f96907b44
C:\Windows\aadhdgh
C:\Windows\dsp
Program Files (x86)\KvUg2SbQotRx
Program Files\29044DMFYR\
Program Files\ALQNKUM7O1
Program Files\Client\
Program Files\HPLion
Program Files\Microleaves\Online Application\Version 2.6.0\
ProgramData\WindowsVolume

SpyHunter Detects & Remove Minergate

File System Details

Minergate may create the following file(s):
# File Name MD5 Detections
1. minergate.exe 66a9e3079bcaee5e5726e88e2f16f0b5 1,686
2. minergate.exe 257f2db1bbd7d3cc7134584d339e671c 349
3. minergate.exe 2d11a614f58d989aea73e23d3ca091c9 214
4. minergate.exe 0de1dd47397eb3621ec16d45f9698d3b 183
5. minergate.exe 59c501a3e2f0418144fd8e127a1c1fdb 183
6. minergate.exe 565e6c5fd8b6afe5ca2bcefb3318e551 139
7. minergate.exe e52fe4bafd353ca2afaf752d5896cd79 138
8. minergate.exe d7527ea427ed170670f37b7dcf635947 136
9. minergate.exe 89dfe36b6ca84edafe426217da890571 91
10. minergate.exe b70bf9dd507439cc5f42209a3065ef5e 80
11. minergate.exe e72d0b6446f11bf1c9bf95b6035e2292 78
12. minergate.exe c13215bf5e9eced32fcce4609f1d27bb 49
13. minergate.exe 51da374d1fcecd625548e7e3e0b33566 44
14. minergate.exe 6b8793718ca24876e929ee7ff496794f 26
15. minergate.exe 1c3d264ea8552bd24ec2ec9282b4d9ea 26
16. minergate.exe 5971a9ac657290a30363fb64720847f8 18
17. minergate.exe a79bd92cf16d927c94d48c52f657712a 10
18. minergate.exe de6aac91bc94a569053c8434c2ac46a5 10
19. minergate.exe 4bc36abdf54760ef97293c88626180ef 8
20. minergate.exe a5ada758269799a5a550165196079fdd 8
21. minergate.exe 0a82f69b6df764cdda6029da8415e50a 6
22. minergate.exe 2348869391248377656c72138e43e371 4
23. minergate.exe 44fa583e398e3ec9c6e4707295db591f 4
24. minergate.exe 137fa567f2d2ac7f05f3dbc773544702 3
25. minergate.exe c6732a0f59a873948396e22660005638 3
26. minergate.exe a7f3df5c2a3b4d04980ea623a5f363a3 2
27. minergate.exe 7d6a2911773384c14b0fe71ce6cc6937 1
28. minergate.exe 07f41d0ad312f7b246bc087debe59fb3 1
More files

Registry Details

Minergate may create the following registry entry or registry entries:

Directories

Minergate may create the following directory or directories:

%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\MinerGate
%ALLUSERSPROFILE%\Start Menu\Programs\MinerGate
%PROGRAMFILES%\minergate
%PROGRAMFILES(x86)%\minergate

Trending

Most Viewed

Loading...