|Short Description||Aims to mine for various cryptocurrencies on your computer system(one or more), using it’s resources.|
|Symptoms||Your computer is heavily overloaded and you may experience cooling fan noises, system performance slow-downs and interruptions.|
|Distribution Method||Via malicious software, previously infected your PC, fake setups and malicious executables, disguised as legitimate ones. Macro infections are also a possibility.|
|Detection Tool|| See If Your System Has Been Affected by JS:MINER |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss JS:MINER.|
JS:MINER Malware – How Does It Spread
In order to infect your computer, the malware primarily uses malicious websites. Such websites may be introduced on your computer as a result of having a Trojan horse or other type of malware or unwanted software previously infected your computer. In addition to this, the JS:MINER malware may also cause an infection by you having to click on a web link believing to be legitimate. Such web links may be concealed in malicious websites as download buttons or sent to you via e-mail, pretending to be legitimate messages with the link, disguised as a “button”, like the malicious e-mail, cleverly disguised as a legitimate Dropbox e-mail.
One of the main infection methods used to infect computers with JS:Miner:C is likely conducted via a Trojan horse, which may land on your computer as a result of a malicious e-mail attachment sent to you via e-mail, like the following.
Another particular infection source of this virus is related to a web link, according to researchers who have reported it on Avast forums.
JS:MINER Malware – Activity
Once it has infected your computer, the JS:MINER malware may come in several different variants, like:
Those are the variants of the malware that have so far been detected, the most prominent of which is the C version of the malware. When it infects your computer, this miner may also drop payload files directly on your computer, since it is classified as a Trojan Horse infection in general:
After the files of the virus are already on your computer, the malware may begin to perform different activities that make it run processes as an administrator on your computer and schedule tasks for automatic execution. This may result in various different activities to occur on your computer:
- It’s CPU usage may increase significantly.
- Increase in GPU utilization.
- It may freeze.
- Significant reduction of its performance.
These are side effects of this virus connecting your computer to a so-called mining pool. Such pools often aim to combine many infected computers by the JS:MINER viruses to the same mining wallet, increasing it’s mining power and hence generating more of the designated cryptocurrency the hackers behind these viruses have created. This results in them generating more cryptocurrency tokens at a smaller time frame as they infect more and more computers in time.
In addition to mining your computer for cryptocurrencies, the JS:MINER malware may also perform other activities on it, such as:
- Take screenshots of your desktop.
- Log your keystrokes.
- Obtain information about BitCoin wallets installed on your computer.
- Steal passwords and registration ID’s.
- Steal system information.
- Steal network information.
Even though it is not known for sure, the malware may do anything to remain hidden on your computer for longer periods of time and this includes updating itself plus downloading other malware or create copies of itself that are on standby in case you delete the original miner file manually. The virus may also perform activities on your computer that may result in JS:MINER mining your computer fileless, in other words by using your web browser without any files that are dropped on your PC.
JS:MINER Virus Family – How to Detect and Remove
In order to detect a JS:MINER virus, it is important that you track the utilization of your CPU and GPU. But, since these viruses are complicated and pretend to not use a significant ammount of your computer’s resources, you should download third-party software, such as CoreTemp and GPUTemp in order to check the actual temperature and usage of your PC’s components, required for mining to take place. If you detect an elevated temperature and usage, reccomendations are to remove JS:MINER from your computer by following the removal instructions down below. They are created in order to help remove JS:MINER either manually or automatically. Furthermore, experts also strongly advise to use an advanced anti-malware software in order to remove JS:MINER, since this will make sure that not only the virus is fully removed but your computer will stay protected against future threats as well.