Trojan.BitCoinMiner

Short bio

Trojan.BitCoinMiner is a generic detection for crypto-currency miners that run on the affected machine without the users’ consent.

Symptoms

Crypto-currency miners use a lot of resources to optimize the earning of crypto-coins, so users may experience slow computers.

Type and source of infection

Because mining uses a lot of resources threat actors try to use other people’s machines to do their mining for them. This detection means that your machine is being used as such.

Aftermath

Besides slowing down your machine, running at peek level for long times may cause damage to your machine and raise electricity bills.

Protection

Malwarebytes blocks Trojan.BitCoinMiner by using real-time protection.

block trohan.bitcoinminer

Malwarebytes blocks Trojan.BitcoinMiner

Remediation

Malwarebytes can detect and remove Trojan.BitcoinMiner without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Add an exclusion

Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.

The Exclusions tab includes a list of items to be excluded from scans. The items may include files, folders, websites, or applications that connect to the Internet, as well as previously detected exploits.

To access the exclusions in Malwarebytes:

  • Click on the Settings tab in the left pane.
  • Click on the Exclusions tab.
  • Click the Add Exclusion button.
  • Select the exclusion type Exclude a File or Folder and use the Browse button to select the main file or folder for the software that you wish to keep.
  • If you want to allow the program to connect to the Internet, for example to fetch updates, add an exclusion of the type Exclude an application that Connects to the Internet and use the Browse button to select the file you wish to grant access.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language