Trojan.BitCoinMiner

Trojan.BitCoinMiner

Short bio

Trojan.BitCoinMiner is Malwarebytes’ generic detection name for crypto-currency miners that run on the affected machine without the users’ consent.

Symptoms

Crypto-currency miners use a lot of resources to optimize the earning of crypto-coins, so users may experience slow computers.

Type and source of infection

Because mining uses a lot of resources threat actors try to use other people’s machines to do their mining for them. This detection means that your machine is being used as such.

Aftermath

Besides slowing down your machine, running at peek level for long times may cause damage to your machine and raise electricity bills.

Protection

Malwarebytes blocks Trojan.BitCoinMiner by using real-time protection.

block trohan.bitcoinminer

Home remediation

Malwarebytes can detect and remove Trojan.BitcoinMiner without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.
  6. Click Quarantine to remove the found threats.
  7. Reboot the system if prompted to complete the removal process.

Business remediation

How to remove Trojan.BitcoinMiner with the Malwarebytes Nebula console

You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.

endpoint menuNebula endpoint tasks menu

Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.Nebula detectionsOn the Quarantine page you can see which threats were quarantined and restore them if necessary.Nebula Quarantaine

Add an exclusion

Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.

  • Open Malwarebytes for Windows.
  • Click the Detection History
  • Click the Allow List
  • To add an item to the Allow List, click Add.
  • Select the exclusion type Allow a file or folder and use the Select a folder button to select the main folder for the software that you wish to keep.
  • Repeat this for any secondary files or folder(s) that belong to the software.

If you want to allow the program to connect to the Internet, for example to fetch updates, also add an exclusion of the type Allow an application to connect to the internet and use the Browse button to select the file you wish to grant access.