Rakhni Malware Selects Alternate Payload If it Finds Bitcoin Wallets on a Victim Machine

  • 158
  •  
  •  
  • 1
  •  
  •  
  •  
    159
    Shares

Rakhni is one of the oldest ransomware strains affecting devices. Partly this is due to it self-updating with the latest patches. The creators of the malware have added the cryptocurrency mining component lately which only deploys on selected PCs.

The ransomware has been in the wild since 2013  and remained alive by keeping a low profile. The security experts at Kaspersky Labs have found a new variant of Rakhni which allows scanning of the user’s machine before actually infecting the computer with a crypto miner using a remote server. If the malware finds a folder named Bitcoin it executes a component on the PC which will encrypt the private key of the Bitcoin wallet in the user’s PC.

If the malware doesn’t find the Bitcoin folder it will then deploy a Cryptocurrency miner from the remote server and install it so the PC affected can mine the cryptocurrency. The report from Kaspersky also said the miner is mining Monero, Monero Original and Dashcoin.

The new version of Rakhni is being distributed via spam Emails with the infection spreading fast in Russia, Kazakhstan, Ukraine, Germany and India.

The spam email from the authors contains a malicious file of Word DOCX and when the DOCX is opened it references it to a PDF file which will execute upon clicking the link.

 

The following two tabs change content below.
Avatar
I am a programmer and tech enthusiast who loves to use my creative skills to solve complex problems. I also love to stay abreast of what is happening in the world of technology, reach me at: [email protected]
Avatar

Harikrishna Mekala

I am a programmer and tech enthusiast who loves to use my creative skills to solve complex problems. I also love to stay abreast of what is happening in the world of technology, reach me at: [email protected]

Do NOT follow this link or you will be banned from the site!