Remove File names Remove Manufacturing Remove Mining Remove Tools
article thumbnail

Outlaw is Back, a New Crypto-Botnet Targets European Organizations

Security Affairs

Once the machine is fully compromised, the attacker will install a complete hacking suite, composed of an IRC bot, an SSH scanner, a bruteforce tool, and an XMRIG crypto-miner. When the machine is completely infected, the installed files are the following: Figure 2: Directory listing. The initial script is the file named “ a ”.

Mining 104