{"id":92309,"date":"2018-11-12T21:01:11","date_gmt":"2018-11-13T05:01:11","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=92309"},"modified":"2025-06-08T19:40:44","modified_gmt":"2025-06-09T02:40:44","slug":"webcobra-malware-uses-victims-computers-to-mine-cryptocurrency","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/","title":{"rendered":"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency"},"content":{"rendered":"<p><em>The authors thank their colleagues Oliver Devane and Deepak Setty for their help with this analysis.<\/em><\/p>\n<p>McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims\u2019 computing power to mine for cryptocurrencies.<\/p>\n<p>Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the machine slows down, leaving the owner with a headache and an unwelcome bill, as the energy it takes to mine a single bitcoin can cost <a href=\"https:\/\/www.marketwatch.com\/story\/heres-how-much-it-costs-to-mine-a-single-bitcoin-in-your-country-2018-03-06\" target=\"_blank\" rel=\"noopener\">from $531 to $26,170<\/a>, according to a recent report.<\/p>\n<p>The increase in the value of cryptocurrencies has inspired cybercriminals to employ malware that steals machine resources to mine crypto coins without the victims\u2019 consent.<\/p>\n<p>The following chart shows how the prevalence of miner malware follows changes in the price of Monero cryptocurrency.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92311\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-1.png\" alt=\"\" width=\"624\" height=\"361\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-1.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-1-300x174.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>1<\/em><em>: The price of cryptocurrency Monero peaked at the beginning of 2018. The total samples of coin miner malware continue to grow. Source: https:\/\/coinmarketcap.com\/currencies\/monero\/.<\/em><\/p>\n<p>McAfee Labs <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/\" target=\"_blank\" rel=\"noopener\">has previously analyzed<\/a> the cryptocurrency file infector CoinMiner; and the Cyber Threat Alliance, with major assistance from McAfee, has published a report, <a href=\"https:\/\/www.cyberthreatalliance.org\/wp-content\/uploads\/2018\/09\/CTA-Illicit-CryptoMining-Whitepaper.pdf\" target=\"_blank\" rel=\"noopener\">\u201cThe Illicit Cryptocurrency Mining Threat.\u201d<\/a> Recently we examined the Russian application WebCobra, which silently drops and installs the Cryptonight miner or Claymore&#8217;s Zcash miner, depending on the architecture WebCobra finds. McAfee products detect and protect against this threat.<\/p>\n<p>We believe this threat arrives via rogue PUP installers. We have observed it across the globe, with the highest number of infections in Brazil, South Africa, and the United States.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92312\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-2.png\" alt=\"\" width=\"719\" height=\"422\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-2.png 719w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-2-300x176.png 300w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/a><\/p>\n<p><em>Figure 2: McAfee Labs heat map of WebCobra infections from September 9\u201313. <\/em><\/p>\n<p>This cryptocurrency mining malware is uncommon in that it drops a different miner depending on the configuration of the machine it infects. We will discuss that detail later in this post.<\/p>\n<h2><strong>Behavior<\/strong><\/h2>\n<p>The main dropper is a Microsoft installer that checks the running environment. On x86 systems, it injects Cryptonight miner code into a running process and launches a process monitor. On x64 systems, it checks the GPU configuration and downloads and executes Claymore&#8217;s Zcash miner from a remote server.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92313\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-3.png\" alt=\"\" width=\"398\" height=\"152\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-3.png 398w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-3-300x115.png 300w\" sizes=\"auto, (max-width: 398px) 100vw, 398px\" \/><\/a><\/p>\n<p><em>Figure 3: WebCobra\u2019s installation window.<\/em><\/p>\n<p>After launching, the malware drops and unzips a password-protected Cabinet archive file with this command:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92314\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-4.png\" alt=\"\" width=\"938\" height=\"35\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-4.png 938w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-4-300x11.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-4-768x29.png 768w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/a><\/p>\n<p><em>Figure 4: The command to unzip the dropped file.<\/em><\/p>\n<p>The CAB file contains two files:<\/p>\n<ul>\n<li>LOC: A DLL file to decrypt data.bin<\/li>\n<li>bin: Contains the encrypted malicious payload<\/li>\n<\/ul>\n<p>The CAB file uses the following script to execute ERDNT.LOC:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92315\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-5.png\" alt=\"\" width=\"1292\" height=\"249\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-5.png 1292w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-5-300x58.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-5-768x148.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-5-1024x197.png 1024w\" sizes=\"auto, (max-width: 1292px) 100vw, 1292px\" \/><\/a><\/p>\n<p><em>Figure 5: The script to load the DLL file, ERDNT.LOC.<\/em><\/p>\n<p>ERDNT.LOC decrypt data.bin and passes the execution flow to it with this routine:<\/p>\n<ul>\n<li>[PlainText_Byte] = (([EncryptedData_Byte] + 0x2E) ^ 0x2E) + 0x2E<\/li>\n<\/ul>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92316\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-6.png\" alt=\"\" width=\"1037\" height=\"525\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-6.png 1037w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-6-300x152.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-6-768x389.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-6-1024x518.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-6-988x500.png 988w\" sizes=\"auto, (max-width: 1037px) 100vw, 1037px\" \/><\/a><\/p>\n<p><em>Figure 6: The decryption routine.<\/em><em>\u00a0<\/em><\/p>\n<p>The program checks the running environment to launch the proper miner, shown in the following diagram:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92317\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-7.png\" alt=\"\" width=\"1469\" height=\"1476\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-7.png 1469w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-7-150x150.png 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-7-300x300.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-7-768x772.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-7-1019x1024.png 1019w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-7-498x500.png 498w\" sizes=\"auto, (max-width: 1469px) 100vw, 1469px\" \/><\/a><\/p>\n<p><em>Figure 7: Launching the proper miner depending on a system\u2019s configuration. <\/em><\/p>\n<p>Once data.bin is decrypted and executed, it tries a few anti-debugging, anti-emulation, and anti-sandbox techniques as well as checks of other security products running on the system. These steps allow the malware to remain undetected for a long time.<\/p>\n<p>Most security products hook some APIs to monitor the behavior of malware. To avoid being found by this technique, WebCobra loads ntdll.dll and user32.dll as data files in memory and overwrites the first 8 bytes of those functions, which unhooks the APIs.<\/p>\n<h2><strong>List of unhooked ntdll.dll APIs<\/strong><\/h2>\n<ul>\n<li>LdrLoadDll<\/li>\n<li>ZwWriteVirtualMemory<\/li>\n<li>ZwResumeThread<\/li>\n<li>ZwQueryInformationProcess<\/li>\n<li>ZwOpenSemaphore<\/li>\n<li>ZwOpenMutant<\/li>\n<li>ZwOpenEvent<\/li>\n<li>ZwMapViewOfSection<\/li>\n<li>ZwCreateUserProcess<\/li>\n<li>ZwCreateSemaphore<\/li>\n<li>ZwCreateMutant<\/li>\n<li>ZwCreateEvent<\/li>\n<li>RtlQueryEnvironmentVariable<\/li>\n<li>RtlDecompressBuffer<\/li>\n<\/ul>\n<h2><strong>List of unhooked user32.dll APIs<\/strong><\/h2>\n<ul>\n<li>SetWindowsHookExW<\/li>\n<li>SetWindowsHookExA<\/li>\n<\/ul>\n<h2><strong>Infecting an x86 system<\/strong><\/h2>\n<p>The malware injects malicious code to svchost.exe and uses an infinite loop to check all open windows and to compare each window\u2019s title bar text with these strings. This is another check by WebCobra to determine if it is running in an isolated environment designed for malware analysis.<\/p>\n<ul>\n<li>adw<\/li>\n<li>emsi<\/li>\n<li>avz<\/li>\n<li>farbar<\/li>\n<li>glax<\/li>\n<li>delfix<\/li>\n<li>rogue<\/li>\n<li>exe<\/li>\n<li>asw_av_popup_wndclass<\/li>\n<li>snxhk_border_mywnd<\/li>\n<li>AvastCefWindow<\/li>\n<li>AlertWindow<\/li>\n<li>UnHackMe<\/li>\n<li>eset<\/li>\n<li>hacker<\/li>\n<li>AnVir<\/li>\n<li>Rogue<\/li>\n<li>uVS<\/li>\n<li>malware<\/li>\n<\/ul>\n<p>The open windows will be terminated if any of preceding strings shows in the windows title bar text.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92318\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-8.png\" alt=\"\" width=\"1110\" height=\"806\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-8.png 1110w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-8-300x218.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-8-768x558.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-8-1024x744.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-8-689x500.png 689w\" sizes=\"auto, (max-width: 1110px) 100vw, 1110px\" \/><\/a><\/p>\n<p><em>Figure 8: Terminating a process if the windows title bar text contains specific strings.<\/em><\/p>\n<p>Once the process monitor executes, it creates an instance of svchost.exe with the miner\u2019s configuration file specified as an argument and injects the Cryptonight miner code.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92319\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-9.png\" alt=\"\" width=\"926\" height=\"179\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-9.png 926w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-9-300x58.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-9-768x148.png 768w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/a><\/p>\n<p><em>Figure 9: Creating an instance of svchost.exe and executing the Cryptonight miner. <\/em><\/p>\n<p>Finally, the malware resumes the process with the Cryptonight miner running silently and consuming almost all the CPU\u2019s resources.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92320\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-10.png\" alt=\"\" width=\"741\" height=\"354\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-10.png 741w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-10-300x143.png 300w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" \/><\/a><\/p>\n<p><em>Figure 10: An x86 machine infected with the Cryptonight miner.<\/em><strong>\u00a0<\/strong><\/p>\n<h2><strong>Infecting an x64 system<\/strong><\/h2>\n<p>The malware terminates the infection if it finds Wireshark running.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92321\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-11.png\" alt=\"\" width=\"380\" height=\"45\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-11.png 380w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-11-300x36.png 300w\" sizes=\"auto, (max-width: 380px) 100vw, 380px\" \/><\/a><\/p>\n<p><em>Figure 11: Checking for Wireshark.<\/em><\/p>\n<p>The malware checks the GPU brand and mode. It runs only if one of the following GPUs is installed:<\/p>\n<ul>\n<li>Radeon<\/li>\n<li>Nvidia<\/li>\n<li>Asus<\/li>\n<\/ul>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92322\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-12.png\" alt=\"\" width=\"967\" height=\"469\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-12.png 967w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-12-300x146.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-12-768x372.png 768w\" sizes=\"auto, (max-width: 967px) 100vw, 967px\" \/><\/a><\/p>\n<p><em>Figure 12: Checking the GPU mode.<\/em><\/p>\n<p>If these checks are successful, the malware creates the following folder with hidden attributes and downloads and executes Claymore&#8217;s Zcash miner from a remote server.<\/p>\n<ul>\n<li>C:\\Users\\AppData\\Local\\WIX Toolset 11.2<\/li>\n<\/ul>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92323\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-13.png\" alt=\"\" width=\"937\" height=\"236\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-13.png 937w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-13-300x76.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-13-768x193.png 768w\" sizes=\"auto, (max-width: 937px) 100vw, 937px\" \/><\/a><\/p>\n<p><em>Figure 13: Requesting the download of Claymore\u2019s Zcash miner.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92324\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-14.png\" alt=\"\" width=\"763\" height=\"180\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-14.png 763w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-14-300x71.png 300w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/a><\/p>\n<p><em>Figure 14: Claymore\u2019s miner.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92325\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-15.png\" alt=\"\" width=\"1375\" height=\"153\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-15.png 1375w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-15-300x33.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-15-768x85.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-15-1024x114.png 1024w\" sizes=\"auto, (max-width: 1375px) 100vw, 1375px\" \/><\/a><\/p>\n<p><em>Figure 15: Executing the miner with its configuration file.<\/em><\/p>\n<p>Finally, the malware drops a batch file at %temp%\\&#8211;xxxxx.cMD to delete the main dropper from [WindowsFolder]\\{DE03ECBA-2A77-438C-8243-0AF592BDBB20}\\*.*.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92326\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-16.png\" alt=\"\" width=\"465\" height=\"92\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-16.png 465w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-16-300x59.png 300w\" sizes=\"auto, (max-width: 465px) 100vw, 465px\" \/><\/a><\/p>\n<p><em>Figure 16: A batch file deleting the dropper.<\/em><\/p>\n<p>The configuration files of the miners follow.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-17.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92327\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-17.png\" alt=\"\" width=\"1099\" height=\"583\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-17.png 1099w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-17-300x159.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-17-768x407.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-17-1024x543.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-17-943x500.png 943w\" sizes=\"auto, (max-width: 1099px) 100vw, 1099px\" \/><\/a><\/p>\n<p><em>Figure 17: Cryptonight\u2019s configuration file.<\/em><\/p>\n<p>This configuration file contains:<\/p>\n<ul>\n<li>The mining pool: 5.149.254.170<\/li>\n<li>Username: 49YfyE1xWHG1vywX2xTV8XZzbzB1E2QHEF9GtzPhSPRdK5TEkxXGRxVdAq8LwbA2Pz7jNQ9gYBxeFPHcqiiqaGJM2QyW64C<\/li>\n<li>Password: soft-net<\/li>\n<\/ul>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-18.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92328\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-18.png\" alt=\"\" width=\"904\" height=\"258\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-18.png 904w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-18-300x86.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/20181029-WebCobra-18-768x219.png 768w\" sizes=\"auto, (max-width: 904px) 100vw, 904px\" \/><\/a><\/p>\n<p><em>Figure 18: Claymore&#8217;s Zcash miner configuration file.<\/em><\/p>\n<p>This configuration file contains:<\/p>\n<ul>\n<li>The mining pool: eu.zec.slushpool.com<\/li>\n<li>Username: pavelcom.nln<\/li>\n<li>Password: zzz<\/li>\n<\/ul>\n<p>Coin mining malware will continue to evolve as cybercriminals take advantage of this relatively easy path to stealing value. Mining coins on other people\u2019s systems requires less investment and risk than ransomware, and does not depend on a percentage of victims agreeing to send money. Until users learn they are supporting criminal miners, the latter have much to gain.<\/p>\n<h2><strong>\u00a0<\/strong><strong>MITRE ATT&amp;CK techniques<\/strong><\/h2>\n<ul>\n<li>Exfiltration over command and control channel<\/li>\n<li>Command-line interface<\/li>\n<li>Hooking<\/li>\n<li>Data from local system<\/li>\n<li>File and directory discovery<\/li>\n<li>Query registry<\/li>\n<li>System information discovery<\/li>\n<li>Process discovery<\/li>\n<li>System time discovery<\/li>\n<li>Process injection<\/li>\n<li>Data encrypted<\/li>\n<li>Data obfuscation<\/li>\n<li>Multilayer encryption<\/li>\n<li>File deletion<\/li>\n<\/ul>\n<h2><strong>Indicators of compromise<\/strong><\/h2>\n<h5>IP addresses<\/h5>\n<ul>\n<li>5.149.249[.]13:2224<\/li>\n<li>5.149.254[.]170:2223<\/li>\n<li>104.31.92[.]212<\/li>\n<\/ul>\n<h5>Domains<\/h5>\n<ul>\n<li>emergency.fee.xmrig[.]com<\/li>\n<li>miner.fee.xmrig[.]com<\/li>\n<li>\u00a0saarnio[.]ru<\/li>\n<li>eu.zec.slushpool[.]com<\/li>\n<\/ul>\n<h4><strong>McAfee detections<\/strong><\/h4>\n<ul>\n<li>CoinMiner Version 2 in DAT Version 8986; Version 3 in DAT Version 3437<\/li>\n<li>l Version 2 in DAT Version 9001; Version 3 in DAT Version 3452<\/li>\n<li>RDN\/Generic PUP.x Version 2 in DAT Version 8996; Version 3 in DAT Version 3447<\/li>\n<li>Trojan-FQBZ, Trojan-FQCB, Trojan-FQCR Versions 2 in DAT Version 9011; Versions 3 in DAT Version 3462<\/li>\n<\/ul>\n<h4><strong>Hashes (SHA-256)<\/strong><\/h4>\n<ul>\n<li>5E14478931E31CF804E08A09E8DFFD091DB9ABD684926792DBEBEA9B827C9F37<\/li>\n<li>2ED8448A833D5BBE72E667A4CB311A88F94143AA77C55FBDBD36EE235E2D9423<\/li>\n<li>F4ED5C03766905F8206AA3130C0CDEDEC24B36AF47C2CE212036D6F904569350<\/li>\n<li>1BDFF1F068EB619803ECD65C4ACB2C742718B0EE2F462DF795208EA913F3353B<\/li>\n<li>D4003E6978BCFEF44FDA3CB13D618EC89BF93DEBB75C0440C3AC4C1ED2472742<\/li>\n<li>06AD9DDC92869E989C1DF8E991B1BD18FB47BCEB8ECC9806756493BA3A1A17D6<\/li>\n<li>615BFE5A8AE7E0862A03D183E661C40A1D3D447EDDABF164FC5E6D4D183796E0<\/li>\n<li>F31285AE705FF60007BF48AEFBC7AC75A3EA507C2E76B01BA5F478076FA5D1B3<\/li>\n<li>AA0DBF77D5AA985EEA52DDDA522544CA0169DCA4AB8FB5141ED2BDD2A5EC16CE<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims\u2019 computing power to mine for cryptocurrencies.<\/p>\n","protected":false},"author":674,"featured_media":92702,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5220,76,338,180],"coauthors":[3973],"class_list":["post-92309","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-cryptocurrency","tag-cybercrime","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims\u2019 computing power to mine for cryptocurrencies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims\u2019 computing power to mine for cryptocurrencies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-13T05:01:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T02:40:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency\",\"datePublished\":\"2018-11-13T05:01:11+00:00\",\"dateModified\":\"2025-06-09T02:40:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/\"},\"wordCount\":1266,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\",\"keywords\":[\"cryptocurrency\",\"cybercrime\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/\",\"name\":\"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\",\"datePublished\":\"2018-11-13T05:01:11+00:00\",\"dateModified\":\"2025-06-09T02:40:44+00:00\",\"description\":\"McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims\u2019 computing power to mine for cryptocurrencies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\",\"width\":2048,\"height\":1152},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency | McAfee Blog","description":"McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims\u2019 computing power to mine for cryptocurrencies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency | McAfee Blog","og_description":"McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims\u2019 computing power to mine for cryptocurrencies.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-11-13T05:01:11+00:00","article_modified_time":"2025-06-09T02:40:44+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency","datePublished":"2018-11-13T05:01:11+00:00","dateModified":"2025-06-09T02:40:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/"},"wordCount":1266,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","keywords":["cryptocurrency","cybercrime","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/","name":"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","datePublished":"2018-11-13T05:01:11+00:00","dateModified":"2025-06-09T02:40:44+00:00","description":"McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims\u2019 computing power to mine for cryptocurrencies.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","width":2048,"height":1152},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"WebCobra Malware Uses Victims\u2019 Computers to Mine Cryptocurrency"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=92309"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92309\/revisions"}],"predecessor-version":[{"id":215286,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92309\/revisions\/215286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/92702"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=92309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=92309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=92309"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=92309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}