Page 1 of 2 12 LastLast
Results 1 to 15 of 16
  1. #1
    Xenon~'s Avatar
    Join Date
    Dec 2015
    Gender
    female
    Location
    C:\Windows\System32\Xenon.dll
    Posts
    1,585
    Reputation
    383
    Thanks
    268
    My Mood
    Tired

    How does a Bitcoin Miner Malware works?

    Title.

    I know it fvcks up your CPU / GPU + electricity but I sort of want to learn more about it, like, can you calculate how efficient it is for the sender? The amount of btc they successfully harvested from the infected, can it be traced to the sender, and how does one create such malware?

    I used to infect the library in my previous uni w/ btc miner but I forgot how to setup things etc... also probably I failed on that attempt.

    c:

  2. #2
    defaulto's Avatar
    Join Date
    Aug 2017
    Gender
    male
    Posts
    461
    Reputation
    427
    Thanks
    347
    My Mood
    Angelic
    Just the same way normal BTC Mining works. The only difference is the infected person didn't agree to that. Also, your victim needs some goods specs so that mining BTC using Cryptojacking is profitable. There are old sources out there on ******. More up-to-date ones get traded in some off-corner communities. These contain all sorts of bypasses so they don't get picked up by AVs. Hack Discussion Forums like mpgh and co. get file submissions like these too once in a while. Good placed and trained File Analyzers can prevent them from breaking out of the queue.

    I am pretty sure a couple of Libraries that provide you with computers and internet access got those installed on them without anyone knowing. And these can range from pretty stealth to breaking your device. Would have done the same if there is no way to trace it back in case local authorities with IT-Experts and shit are onto it.
    Last edited by defaulto; 04-09-2021 at 07:47 AM.

    #LOGS
    12-02-2020 ⌨ [MPGH]defaulto got gifted the Premium Membership from [MPGH]Azuki - sponsored by [MPGH]Flengo.
    27-11-2019 ⌨ [MPGH]defaulto captured the GFX Team Base together with [MPGH]Howl & [MPGH]Poonce.
    08-14-2017 ⌨ defaulto joined the game.

  3. The Following User Says Thank You to defaulto For This Useful Post:

    Xenon~ (04-09-2021)

  4. #3
    lainchan's Avatar
    Join Date
    Mar 2021
    Gender
    male
    Posts
    23
    Reputation
    10
    Thanks
    10
    Quote Originally Posted by Xenon~ View Post
    Title.

    I know it fvcks up your CPU / GPU + electricity but I sort of want to learn more about it, like, can you calculate how efficient it is for the sender? The amount of btc they successfully harvested from the infected, can it be traced to the sender, and how does one create such malware?

    I used to infect the library in my previous uni w/ btc miner but I forgot how to setup things etc... also probably I failed on that attempt.

    c:
    Learn C++ and code the malware yourself. BTC can be traced back if you spend the BTC or trade it somewhere that has your real identity attached through blockchain analysis, though XMR is more popular for miners nowadays because it's more profitable by far. If you're going that route, it's more profitable to make a program that analyzes the user's clipboard for an address and then replaces it with your own address that's very similar. As for how you'd spread it, because you coded it yourself, it's largely undetectable, the ideal way to spread a virus would be to buy a cheap seedbox (like $10-15/mo) and then bind your virus to AAA releases. No point in spreading BTC miners, you're not going to profit. XMR or an altcoin, or clipboard malware is the only realistic way you're going to make any money. Learn C++ or Go or you'll end up infecting yourself with malware yourself that's only going to be easily detected.

  5. The Following User Says Thank You to lainchan For This Useful Post:

    Xenon~ (04-09-2021)

  6. #4
    Xenon~'s Avatar
    Join Date
    Dec 2015
    Gender
    female
    Location
    C:\Windows\System32\Xenon.dll
    Posts
    1,585
    Reputation
    383
    Thanks
    268
    My Mood
    Tired
    Appreciate all the responses above.

    I did search about this before in ****** and in reddit.
    @defaulto have to agree that it is not worth since most computers at our uni library are not equipped w/ high specs etc.
    @lainchan thanks for the suggestion but that way is too harsh (too bad) compared to sending ppl w/ btc crypto malware.
    Just want to know how do they setup this whether they use (what common software which etc.).

  7. #5
    lainchan's Avatar
    Join Date
    Mar 2021
    Gender
    male
    Posts
    23
    Reputation
    10
    Thanks
    10
    Quote Originally Posted by Xenon~ View Post
    Appreciate all the responses above.

    I did search about this before in ****** and in reddit.
    @defaulto have to agree that it is not worth since most computers at our uni library are not equipped w/ high specs etc.
    @lainchan thanks for the suggestion but that way is too harsh (too bad) compared to sending ppl w/ btc crypto malware.
    Just want to know how do they setup this whether they use (what common software which etc.).
    BTC mining isn't worth it even if you manage to infect computers that are high spec, the payout is still abysmal. The reason why has to do with the hashing algorithm and difficulty, BTC uses SHA-256 and there's dedicated hardware far better then normal CPU/GPU's. Anyhow, you can mine altcoins and convert it to BTC easily. The software varies, I think your best bet, if you don't want to code yourself, is buy a setup on the deepweb from the most trusted vendor you can and hope it's not malware that's going to steal your victims. Or look around for an opensourced RAT, btw, either way, just make sure to bind the virus to things that people will have a reason to disable their AV. Cracked video games are one of the best ways imo. The reason why the keyboard clipper works so well is that

    1) it's non-intrusive and hard to be detected (if coded properly)
    2) it's very easy to code
    3) huge potential for profits by taking some poor chump's stack

    Though, yeah, I guess if you meant "too harsh" as in "wow, I really don't want to steal this kid's life savings" then yeah, suppose it is harsh.

  8. The Following User Says Thank You to lainchan For This Useful Post:

    Xenon~ (04-09-2021)

  9. #6
    Xenon~'s Avatar
    Join Date
    Dec 2015
    Gender
    female
    Location
    C:\Windows\System32\Xenon.dll
    Posts
    1,585
    Reputation
    383
    Thanks
    268
    My Mood
    Tired
    Quote Originally Posted by lainchan View Post
    BTC mining isn't worth it even if you manage to infect computers that are high spec, the payout is still abysmal. The reason why has to do with the hashing algorithm and difficulty, BTC uses SHA-256 and there's dedicated hardware far better then normal CPU/GPU's. Anyhow, you can mine altcoins and convert it to BTC easily. The software varies, I think your best bet, if you don't want to code yourself, is buy a setup on the deepweb from the most trusted vendor you can and hope it's not malware that's going to steal your victims. Or look around for an opensourced RAT, btw, either way, just make sure to bind the virus to things that people will have a reason to disable their AV. Cracked video games are one of the best ways imo. The reason why the keyboard clipper works so well is that

    1) it's non-intrusive and hard to be detected (if coded properly)
    2) it's very easy to code
    3) huge potential for profits by taking some poor chump's stack

    Though, yeah, I guess if you meant "too harsh" as in "wow, I really don't want to steal this kid's life savings" then yeah, suppose it is harsh.
    yeah m8 but i could've done (w/ some blackmailing included) yet im not bad enough to do it so no no

    just wanted to learn some new things

  10. #7
    Onety One's Avatar
    Join Date
    Apr 2021
    Gender
    male
    Location
    Home
    Posts
    28
    Reputation
    10
    Thanks
    11
    Quote Originally Posted by Xenon~ View Post


    yeah m8 but i could've done (w/ some blackmailing included) yet im not bad enough to do it so no no

    just wanted to learn some new things
    Very interesting... I wish to atleast learn how to create these type of infectious files. They truly intrigue me, I just don't have the sliughtest clue where to start lol

  11. #8
    Xenon~'s Avatar
    Join Date
    Dec 2015
    Gender
    female
    Location
    C:\Windows\System32\Xenon.dll
    Posts
    1,585
    Reputation
    383
    Thanks
    268
    My Mood
    Tired
    Quote Originally Posted by Onety One View Post
    Very interesting... I wish to atleast learn how to create these type of infectious files. They truly intrigue me, I just don't have the sliughtest clue where to start lol
    i just leech before and try to experiment on a virtual machine / sandbox.

    started w/ keylogger to monitor who uses my devices w/o my permission.

    there are plenty of tutorials in youtube / reddit / ****** but use at your own risk.

  12. #9
    Mayion's Avatar
    Join Date
    Oct 2012
    Gender
    male
    Location
    Bed
    Posts
    13,504
    Reputation
    4018
    Thanks
    8,372
    My Mood
    Twisted
    I don't see the point in telling you how to fuck up someone's machine and potentially making them lose all their files, even as a "new thing to learn"
    I do not use any type of messenger outside of MPGH.
    Inactive but you can reach me through VM/PM.










     

    Donator - 30 August 2013
    Battlefield Minion - 26 October 2013

    Blackshot Minion - 14 January 2014/16 September 2014
    Minecraft Minion - 7 February 2014/16 September 2014
    WarRock Minion - 23 February 2014
    League of Legends Minion - 21 March 2014

    Minion+ - 15 May 2014
    Other Semi-Popular First Person Shooter Minion - 8 August 2014
    CrossFire Minion - 23 October 2014
    Programming Section Minion - 13 November 2014
    Marketplace Minion - 7 December 2014

    Official Middleman - 7 December 2014 - 27 June 2015
    Moderator - 29 December 2014
    Project Blackout Minion - 10 January 2015
    News Force Interviewer - January 2015
    Steam Games Minion - 21 March 2015
    Dragon Nest Minion - 31 March 2015
    Publicist - April 2015 - 21 September 2015
    Global Moderator - 25 August 2015
    Super User - 13 August 2016



  13. #10
    Dave84311's Avatar
    Join Date
    Dec 2005
    Gender
    male
    Location
    The Wild Wild West
    Posts
    35,837
    Reputation
    5782
    Thanks
    41,292
    My Mood
    Devilish
    Someone is gonna be taking their computer to Bestbuy and complaining about it running so hot





    THE EYE OF AN ADMINISTRATOR IS UPON YOU. ANY WRONG YOU DO IM GONNA SEE, WHEN YOU'RE ON MPGH, LOOK BEHIND YOU, 'CAUSE THATS WHERE IM GONNA BE


    "First they ignore you. Then they laugh at you. Then they fight you. Then you lose.” - Dave84311

    HAVING VIRTUAL DETOX

  14. #11
    bape's Avatar
    Join Date
    Apr 2014
    Gender
    male
    Posts
    374
    Reputation
    10
    Thanks
    43
    My Mood
    Amused
    Quote Originally Posted by defaulto View Post
    Just the same way normal BTC Mining works. The only difference is the infected person didn't agree to that. Also, your victim needs some goods specs so that mining BTC using Cryptojacking is profitable. There are old sources out there on ******. More up-to-date ones get traded in some off-corner communities. These contain all sorts of bypasses so they don't get picked up by AVs. Hack Discussion Forums like mpgh and co. get file submissions like these too once in a while. Good placed and trained File Analyzers can prevent them from breaking out of the queue.

    I am pretty sure a couple of Libraries that provide you with computers and internet access got those installed on them without anyone knowing. And these can range from pretty stealth to breaking your device. Would have done the same if there is no way to trace it back in case local authorities with IT-Experts and shit are onto it.
    Does the victims PC really need to be powerful to be “profitable”? Obviously the more powerful their computer is the higher the hash rate, but there are so many more low to mid end consumer PCs than powerful ones that it just seems like that wouldn’t make sense. Obviously it costs something to spread the malware and get people infected, but I would think that even a bunch of shitty low end HP laptops with igpus would somewhat quickly make up for the costs which I can’t imagine are much more than a cheap domain and an S3 instance

  15. #12
    Dab's Avatar
    Join Date
    Jun 2015
    Gender
    female
    Posts
    5,426
    Reputation
    663
    Thanks
    9,873
    Quote Originally Posted by Dave84311 View Post
    Someone is gonna be taking their computer to Bestbuy and complaining about it running so hot
    Hypothetically speaking an efficient miner malware design should be detecting whether you're pulling your task bar, opening task manager, or playing a video game / using a program like webbrowser or video editing software. You could in theory just run your miner whenever they're AFK, playing games, doing resource intense shit, and when they're not viewing tasks or temps.


    Also if you say, infected a popular repack or crack then seed it to fuck you can certainly get a ton of miners and make a good bit of money.
    Last edited by Dab; 04-10-2021 at 03:03 AM.
    Former BattleOn Minion

    If you cannot run trainers please see this thread: https://www.mpgh.net/forum/showthread.php?t=1170564





  16. The Following User Says Thank You to Dab For This Useful Post:

    Xenon~ (04-10-2021)

  17. #13
    YeAhx_'s Avatar
    Join Date
    Jun 2015
    Gender
    male
    Posts
    45
    Reputation
    10
    Thanks
    2
    My Mood
    Amused
    Quote Originally Posted by Dab View Post
    Also if you say, infected a popular repack or crack then seed it to fuck you can certainly get a ton of miners and make a good bit of money.
    Exactly this. Most of them downloading these repacks don't know shit about malware or think its a false positive.

  18. #14
    defaulto's Avatar
    Join Date
    Aug 2017
    Gender
    male
    Posts
    461
    Reputation
    427
    Thanks
    347
    My Mood
    Angelic
    Quote Originally Posted by bape View Post
    Does the victims PC really need to be powerful to be “profitable”? Obviously the more powerful their computer is the higher the hash rate, but there are so many more low to mid end consumer PCs than powerful ones that it just seems like that wouldn’t make sense. Obviously it costs something to spread the malware and get people infected, but I would think that even a bunch of shitty low end HP laptops with igpus would somewhat quickly make up for the costs which I can’t imagine are much more than a cheap domain and an S3 instance
    Yea. Budget hardware isn't made for BTC Mining. And the payout is pretty low for successfully done transactions. So you'd need someone whose hardware is good at doing that to profit something at all. As people above said you go with alt-coins instead. And given you got tons of people, why not go with alt-coins too. You would earn more that way. However you turn it, mining BTC, isn't as lucrative as something else.
    Last edited by defaulto; 04-10-2021 at 07:17 AM.

    #LOGS
    12-02-2020 ⌨ [MPGH]defaulto got gifted the Premium Membership from [MPGH]Azuki - sponsored by [MPGH]Flengo.
    27-11-2019 ⌨ [MPGH]defaulto captured the GFX Team Base together with [MPGH]Howl & [MPGH]Poonce.
    08-14-2017 ⌨ defaulto joined the game.

  19. The Following User Says Thank You to defaulto For This Useful Post:

    Xenon~ (04-10-2021)

  20. #15
    Dave84311's Avatar
    Join Date
    Dec 2005
    Gender
    male
    Location
    The Wild Wild West
    Posts
    35,837
    Reputation
    5782
    Thanks
    41,292
    My Mood
    Devilish
    Quote Originally Posted by Dab View Post
    Hypothetically speaking an efficient miner malware design should be detecting whether you're pulling your task bar, opening task manager, or playing a video game / using a program like webbrowser or video editing software. You could in theory just run your miner whenever they're AFK, playing games, doing resource intense shit, and when they're not viewing tasks or temps.


    Also if you say, infected a popular repack or crack then seed it to fuck you can certainly get a ton of miners and make a good bit of money.
    You would think so but its a race against time when it comes to viral shit





    THE EYE OF AN ADMINISTRATOR IS UPON YOU. ANY WRONG YOU DO IM GONNA SEE, WHEN YOU'RE ON MPGH, LOOK BEHIND YOU, 'CAUSE THATS WHERE IM GONNA BE


    "First they ignore you. Then they laugh at you. Then they fight you. Then you lose.” - Dave84311

    HAVING VIRTUAL DETOX

Page 1 of 2 12 LastLast

Similar Threads

  1. [Help Request] How does the Middle man system work?
    By GerrysamHD in forum Suggestions, Requests & General Help
    Replies: 0
    Last Post: 02-19-2015, 01:13 PM
  2. How does CS:GO Hack Patches Work?
    By D3c0d3d828 in forum Counter-Strike 2 Discussions
    Replies: 3
    Last Post: 11-16-2014, 06:36 AM
  3. [Help Request] how does free email recovery service work
    By kalbaz in forum CrossFire Help
    Replies: 5
    Last Post: 08-07-2013, 02:37 PM
  4. So, how does this Black Market really works ?
    By PasterOfMuppets in forum CrossFire Discussions
    Replies: 7
    Last Post: 01-04-2012, 06:47 PM
  5. How does the 5th/6th slot work?
    By Inna in forum WarRock - International Hacks
    Replies: 5
    Last Post: 07-05-2007, 10:16 AM