Skip to content

Why not to borrow some computational power for mining?

Notifications You must be signed in to change notification settings

francestu96/CryptoJacker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CryptoJacker

Why not to borrow some computational power to mine?

Disclaimer

This project is for educational purpose only! Use it at your own risk!

Description

This malware use a quarter of the victim CPU power to mine Bitcoin.

Since I want the mining process remains hidden to the user, I had to use x64Hider.exe and ProcessHider.exe executables.

Since they are detected as virus, I had to encrypt them before (File0 and File1 are the encrypted version of them, indeed)

Once the process is hidden, the malware creates an antivirus path exception where the miner will be placed.

Finally it creates a task in the Windows planner to schedule its activation at any reboot.

About

Why not to borrow some computational power for mining?

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published