How to Remove Coinhive Monero Miner Trojan from Your PC

This article aims to help you by showing you how to remove the Miner Trojan using Coinhive JavaScript to mine your PC for Monero cryptocurrency.

A new mining Trojan Horse has been detected on victims computers. The Trojan is unique by the fact that it uses the online mining website, called Coinhive, which takes advantage of JavaScript technology to mine the cryptocurrency Monero on the computer of the ones visiting it. However, the Trojan manipulates this JavaScript to incorporate it into it’s code and runs scripts that mine it at the expense of your computer’s resources. If you suspect that your computer has been infected by this Trojan horse, we strongly advise you to read this article and learn how to detect and remove Coinhive Monero Miner Trojan.

Threat Summary

Name Coinhive Monero Miner Trojan
Type Crypto Miner Malware
Short Description The end goal of this malware is to mine for the Cryptocurrency Monero, using your computer’s CPU and GPU resources.
Symptoms Having this malware on your PC, results in elevated CPU and GPU usage by it’s malicious process. If it remains on your computer for longer periods of time, the virus may even break your computer’s components.
Distribution Method Spam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by malware


Malware Removal Tool

User Experience Join Our Forum to Discuss Coinhive Monero Miner Trojan.

Update November 2017!
Coinhive Monero miner has become one of the most widely distributed JavaScript miner, spreading on a lot of websites all over the world wide web. The miner has been detected in Torrent sites, sites of suspicious character and even online blogs.

Coinhive Monero Miner Trojan – How Did I Get Infected?

The infection process, related to Coinhive Monero Miner is no different than with any other malware. The virus may come on your computer as a result from you downloading a rather suspicious setup, patch, license activator or a malicious Microsoft Office document on your computer and executing it. Such may pose as different types of legitimate files which are either uploaded on torrent websites or uploaded on suspicious downloading sites.

The main method by which most victims become infected with mining Trojans, such as the Coinhive Monero Miner is actually via e-mail spam messages. Most messages aim to trick victims into opening a malicious e-mail attachment, making it look like, the attachment is a legitimate file, such as:

  • Receipt.
  • Invoice.
  • Banking statement.
  • Report of suspicious activity in your PayPal / banking account.

The messages in such e-mails may look like the example below:

We could not deliver your parcel, #00000739097
FedEx 2Day A.M.
Sent: Tuesday, August 18. 2015 at 3:14 AM
To: Contact
Attached file: (2.5 KB)
Dear Customer,
we could not deliver your parcel.
You can review complete details of your order in the find attached.
warm regards,
Marshall Hampton,
Sr. Operation Agent.

Coinhive Miner Trojan – Malicious Activity

When an infection with Coinhive Miner Trojan takes place on your computer, the malware immediately begins to drop it’s payload files on your computer. They may be dropped in some of the following Windows directories or a completely random one on your PC:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%

After this is done, the virus may run a malicious file which is executed in an obfuscated manner. To achieve this, the Trojan uses obfuscation software that hides it from antivirus programs’ definitions. The file is ran as an .exe process on your Windows Task Manager and it may be hidden. If it is not hidden, you can detect by the fact that it may take a significant percentage of your GPU (Video Card) and CPU (Central Processor). This may result in your computer slowing down significantly to even freezing at times, especially if it is a low-end rig.

The malicious executable, belonging to Coinhive Miner Trojan is also a file that may establish connection to the Coinhive network and mine Monero hashes using your computer’s resources. Although mining is profitable in some cases with the appropriate rigs, the Monero mining operation accredits Monero coins to the hacker who installed the Trojan on your computer instead of to you.

Furthermore, since Coinhive Miner Trojan is malware, it may also be configured to steal different information from your computer, which may be:

  • Your passwords.
  • Your financial information.
  • Your system information.
  • Your unsecured connection ports.

The virus may use this and other information to perform other malicious activities on your computer system, like:

  • Install other crypto mining Trojans.
  • Update it’s obfuscation to remain undetected for longer periods on your computer systems.
  • Collect the keystrokes you type in real-time.
  • Collect data, concering your IP address, network, antivirus and information, like the one stated in the bullet points above.

How to Detect and Remove Coinhive Monero Miner Trojan

For the removal process of this Monero miner, you will have to isolate the virus and look for the files to delete them. You also have to manually locate the settings it has changed and revert them back to normal. However, since this takes time, experts recommend removing Coinhive Monero Miner automatically from your computer by detecting it with an advanced anti-malware software. Installing such program will also help you stay protected against future infections, like the Coinhive Monero Miner Trojan.


Ventsislav Krastev

Ventsislav is a cybersecurity expert at SensorsTechForum since 2015. He has been researching, covering, helping victims with the latest malware infections plus testing and reviewing software and the newest tech developments. Having graduated Marketing as well, Ventsislav also has passion for learning new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management, Network Administration and Computer Administration of System Applications, he found his true calling within the cybersecrurity industry and is a strong believer in the education of every user towards online safety and security.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share