JS:MINER-C Trojan Miner - WHAT IS IT and How to Remove It

JS:MINER-C Trojan Miner – WHAT IS IT and How to Remove It

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article has been created in order to help explain what is the JS:MINER [Trj] miner malware and how to detect and remove it from your computer system.

A new miner malware, detected to be spread via the web browsers of the victims, using JavaScript has been reported to be existing and spreading and multiple different virus variants. The infection is a Trojan horse, infecting via JavaScript, hence it’s detection name JS:MINER [Trj] by major antivirus companies, like AVG and Avast. In the event that your computer has experienced the JS:MINER malware infection, recommendations are to read this article in order to learn how to fully erase this malware and prevent it from mining cryptocurrencies, like BitCoin or Monero on your computer.

Threat Summary

TypeCryptoCurrency Miner
Short DescriptionAims to mine for various cryptocurrencies on your computer system(one or more), using it’s resources.
SymptomsYour computer is heavily overloaded and you may experience cooling fan noises, system performance slow-downs and interruptions.
Distribution MethodVia malicious software, previously infected your PC, fake setups and malicious executables, disguised as legitimate ones. Macro infections are also a possibility.
Detection Tool See If Your System Has Been Affected by JS:MINER


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss JS:MINER.

JS:MINER Malware – How Does It Spread

A new cryptocurrency miner trojan was recently detected to mine various different types of cryptocurrencies via JavaScript. The malware has been dtected by several major antivirus companies t perofrm significatn miner activities via comrpomised software or websites.

In order to infect your computer, the malware primarily uses malicious websites. Such websites may be introduced on your computer as a result of having a Trojan horse or other type of malware or unwanted software previously infected your computer. In addition to this, the JS:MINER malware may also cause an infection by you having to click on a web link believing to be legitimate. Such web links may be concealed in malicious websites as download buttons or sent to you via e-mail, pretending to be legitimate messages with the link, disguised as a “button”, like the malicious e-mail, cleverly disguised as a legitimate Dropbox e-mail.

One of the main infection methods used to infect computers with JS:Miner:C is likely conducted via a Trojan horse, which may land on your computer as a result of a malicious e-mail attachment sent to you via e-mail, like the following.

Another particular infection source of this virus is related to a web link, according to researchers who have reported it on Avast forums.

JS:MINER Malware – Activity

Once it has infected your computer, the JS:MINER malware may come in several different variants, like:


Those are the variants of the malware that have so far been detected, the most prominent of which is the C version of the malware. When it infects your computer, this miner may also drop payload files directly on your computer, since it is classified as a Trojan Horse infection in general:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%
  • %Windows%

After the files of the virus are already on your computer, the malware may begin to perform different activities that make it run processes as an administrator on your computer and schedule tasks for automatic execution. This may result in various different activities to occur on your computer:

  • It’s CPU usage may increase significantly.
  • Increase in GPU utilization.
  • It may freeze.
  • Significant reduction of its performance.

These are side effects of this virus connecting your computer to a so-called mining pool. Such pools often aim to combine many infected computers by the JS:MINER viruses to the same mining wallet, increasing it’s mining power and hence generating more of the designated cryptocurrency the hackers behind these viruses have created. This results in them generating more cryptocurrency tokens at a smaller time frame as they infect more and more computers in time.

In addition to mining your computer for cryptocurrencies, the JS:MINER malware may also perform other activities on it, such as:

  • Take screenshots of your desktop.
  • Log your keystrokes.
  • Obtain information about BitCoin wallets installed on your computer.
  • Steal passwords and registration ID’s.
  • Steal system information.
  • Steal network information.

Even though it is not known for sure, the malware may do anything to remain hidden on your computer for longer periods of time and this includes updating itself plus downloading other malware or create copies of itself that are on standby in case you delete the original miner file manually. The virus may also perform activities on your computer that may result in JS:MINER mining your computer fileless, in other words by using your web browser without any files that are dropped on your PC.

JS:MINER Virus Family – How to Detect and Remove

In order to detect a JS:MINER virus, it is important that you track the utilization of your CPU and GPU. But, since these viruses are complicated and pretend to not use a significant ammount of your computer’s resources, you should download third-party software, such as CoreTemp and GPUTemp in order to check the actual temperature and usage of your PC’s components, required for mining to take place. If you detect an elevated temperature and usage, reccomendations are to remove JS:MINER from your computer by following the removal instructions down below. They are created in order to help remove JS:MINER either manually or automatically. Furthermore, experts also strongly advise to use an advanced anti-malware software in order to remove JS:MINER, since this will make sure that not only the virus is fully removed but your computer will stay protected against future threats as well.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

1 Comment

  1. AvatarNiccolò

    Anche dopoaver formattato ho JC:Miner-AV mi pare e non riesco a toglierlo, potrebbe essere nella rete wifi?


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share