Mainstay
Well-Known Member
- Reaction score
- 747
Hi All,
I have a system that was deployed ~6 months ago and is protected by ESET.
It runs headless but users have access to it via internal file sharing as well as via RDP (limited user accounts).
A few weeks ago I received an alert that my backups failed and I logged in and corrected the problem.
Tonight I received the same alert and dug deeper. It seems that ~29 of the scheduled Windows Tasks had become corrupted and the system was in fact running a bit mining operation. The 29 scheduled tasks had all been either completely corrupted OR re-written with calls to a boardroot.exe
Malwarebytes only considers this "riskware" and HitManPro considered it risky, but not an actual threat.
Wow - it is running at 88% CPU on a pretty slick system.
This is the ini file associated with this program which is SOMEHOW operating out of a disabled Guest account.
I won't blank any of the data (and rest assured, that gmail account doesn't belong to anyone on my end).
Removing it is turning out to be a real pain as it re-constitutes itself quickly.
I have:
Have any of you encountered this before?
Any thoughts on killing it?
Thanks!
--Matthew
I have a system that was deployed ~6 months ago and is protected by ESET.
It runs headless but users have access to it via internal file sharing as well as via RDP (limited user accounts).
A few weeks ago I received an alert that my backups failed and I logged in and corrected the problem.
Tonight I received the same alert and dug deeper. It seems that ~29 of the scheduled Windows Tasks had become corrupted and the system was in fact running a bit mining operation. The 29 scheduled tasks had all been either completely corrupted OR re-written with calls to a boardroot.exe
Malwarebytes only considers this "riskware" and HitManPro considered it risky, but not an actual threat.
Wow - it is running at 88% CPU on a pretty slick system.
This is the ini file associated with this program which is SOMEHOW operating out of a disabled Guest account.
I won't blank any of the data (and rest assured, that gmail account doesn't belong to anyone on my end).
[General]
version=6.6
server=https://minergate.com
minimizeToTray=true
closeToTray=true
showGpu=true
clientId={5c1cff45-44d8-4d7e-a8fd-930534e735e1}
email=vanillamorison@gmail.com
suppress_achievement_notify=true
[miners]
aeon\visible=false
aeon\pool=stratum+tcp://aeon.pool.minergate.com:45690
bcn\visible=false
bcn\pool=stratum+tcp://bcn.pool.minergate.com:45550
dsh\visible=false
dsh\mergedMining=
dsh\mergedPools\fcn=stratum+tcp://fcn-dsh.pool.minergate.com:45730
dsh\mergedPools\mcn=stratum+tcp://mcn-dsh.pool.minergate.com:45740
dsh\pool=stratum+tcp://dsh.pool.minergate.com:45720
duck\visible=false
duck\pool=stratum+tcp://duck.pool.minergate.com:45620
etc\visible=false
etc\pool=stratum+tcp://etc.pool.minergate.com:45777
eth\visible=false
eth\pool=stratum+tcp://eth.pool.minergate.com:45791
fcn\visible=false
fcn\pool=stratum+tcp://fcn.pool.minergate.com:45610
inf8\visible=false
inf8\mergedMining=
inf8\mergedPools\fcn=stratum+tcp://fcn-inf8.pool.minergate.com:45760
inf8\mergedPools\mcn=stratum+tcp://mcn-inf8.pool.minergate.com:45770
inf8\pool=stratum+tcp://inf8.pool.minergate.com:45750
mcn\visible=false
mcn\pool=stratum+tcp://mcn.pool.minergate.com:45640
mro\visible=true
mro\pool=stratum+tcp://mro.pool.minergate.com:45560
qcn\visible=false
qcn\mergedMining=
qcn\mergedPools\fcn=stratum+tcp://fcn-qcn.pool.minergate.com:45600
qcn\mergedPools\mcn=stratum+tcp://mcn-qcn.pool.minergate.com:45670
qcn\pool=stratum+tcp://qcn.pool.minergate.com:45570
btc\pool=stratum+tcp://btc.pool.minergate.com:3335
devFeeCC\pool=stratum+tcp://:0
ltc\pool=stratum+tcp://ltc.pool.minergate.com:3336
mro\speed=7
mro\running=true
Removing it is turning out to be a real pain as it re-constitutes itself quickly.
I have:
- ensured the Guest account is disabled in both GPO and in compmgmt.msc;
- I have set the security on the referenced folders to Guest as being denied access (deleting the folders isn't sufficient as it re-builds them);
- redirected all of those addresses to loop back to 127.0.0.1 via hosts file;
- have brought in second opinions from other antivirus makers who don't seem to think it is a big deal;
- have nuked all affected scheduled tasks (yikes!, going to have a helluva time rebuilding those!)
- have searched through the registry and killed off any references to boardroot and minergate
- have ensured there are no calls the virus / service in autoruns
- have ensured the service is not actually running while I've been doing all of this
- have cursed the makers of such a bit of software most vehemently
- have written on TN because I don't know... maybe one of you has the wisdom to beat this thing
Have any of you encountered this before?
Any thoughts on killing it?
Thanks!
--Matthew
Last edited: