KingMiner Malware Targets Windows Servers and Uses 100% CPU To Mine Monero

KingMiner malware targets Windows server and utilizes entire CPU resources to mine Monero. The malware primarily targets Microsoft Servers using IIS\SQL.

The malware was first identified in June 2018, security researchers form Checkpoint detected new version of KingMiner with significant that bypass several detection engines.

KingMiner malware gains access to the machines by using brute force method to download Windows Scriptlet file (.sct) on the victim’s machine.

Then it will detect the CPU architecture of the infected machine and downloads the XML payload file based on the CPU architecture. The downloaded zip file includes five files.

config.json – XMRig CPU miner configuration file.
md5.txt – Text file containing only the string “zzz.”
powered.exe (called fix.exe in older versions) – The main executable file.
soundbox.dll/soundbox.dll – DLL files containing functions to be exported by powered.exe.
x.txt/y.png – Binary blob files. Note – This is not a real PNG file.

Researchers said the powered.exe is executed, then it creates XMRig miner and appends key on the registry, and executes functions from DLL files.

The function King1 decodes the binary blob file x.txt & y.png, which is the modified version of the XMRig CPU miner.

The XMRig CPU Miner designed to consume only 75% of the CPU resource but it consumes of 100%. The malware is evolving constantly and it has placeholders for future operations or upcoming updates which will make this malware even harder to detect.

Related Read

Powerful Mobile Malware Rotexy Launched over 70,000 Attacks with Banking Trojan & Ransomware Modules

$60 Million Worth Cryptocurrencies Stolen Hackers From Japanese Cryptocurrency Exchange

Bittrex Cryptocurrency Exchange Delist the Bitcoin Gold After They Declined to Pay 12,372 BTG for Cyber Attack

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…

7 hours ago

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…

7 hours ago

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…

7 hours ago

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…

12 hours ago

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…

14 hours ago

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in…

14 hours ago