Moloko CPU Miner

By GoldSparrow in Potentially Unwanted Programs

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 104
First Seen: August 2, 2017
Last Seen: June 30, 2021
OS(es) Affected: Windows

The Moloko CPU Miner is classified as a Potentially Unwanted Program (PUP), which is reported to be abused for profit by planting the app on the computers of unsuspecting users. The Moloko CPU Miner is advertised as a tool that allows the PC users to take advantage of a powerful processor unit and use it to help manage the flow of the Monero (XMR) digital crypto currency. The process is called "mining, " and it requires processing transactions made with encrypted data blocks, which can be very tasking for a machine. There are companies who rent processing capabilities to digital currency markets like Blockchain.info and many others. The interesting feature of apps like Moloko is that they can be used by regular users looking to make money with their machines. As you may expect, imaginative and ambitious third parties saw an opportunity to build a custom Moloko CPU Miner and install it on machines they do not own and control.

Consequently, users who are running the Moloko CPU Miner on their systems not knowing about it may experience severely diminished performance and program crashes due to the lack of CPU power. The operators of the corrupted Moloko network of machines delegate new mining tasks and collect revenue produced with the power of compromised machines. One such corrupted Moloko CPU Miner was found to download the necessary client-server configuration from a site named milara.at[.]ua and registered to the 193.109.247.11 IP address. Additionally, the miner in question connects to a Monero pool via eu.dwarfpool[.]com:8050 as it begins its operation. The work that apps like the Moloko CPU Miner, isMiner and NsCpuCNMiner perform requires a lot of processing power, and the software is not recommended to be used on low and mid-tier machines as it is both inefficient and may damage your computer. However, the team behind the corrupted Moloko CPU Miner does not appear to consider such aspects and seeks to install their product on as many machines as possible only. The tactic is an example of basic problem-solving capabilities, and cyber security vendors have developed ways to detect and remove the Moloko CPU Miner. PC users that are not running a clean copy of the Moloko CPU Miner of their own accord and experience diminished computer stability and performance may be shown security alerts, which include the following tags:

  • TROJ_GEN.R031C0OGT17
  • Trojan.CoinMiner!8.30A (cloud:wgjnq0WXdnG)
  • Trojan.GenericKD.5705300 (B)
  • Trojan.Win32.Generic!BT
  • Trojan.Win32.Z.Coinminer.9728.AK
  • Trojan/Win32.Snojan
  • Trojan/Win32.Snojan.C2007528
  • a variant of MSIL/CoinMiner.AAC

Trending

Most Viewed

Loading...