WebCobra
WebCobra is a crypto-jacking Trojan that hijacks the PC for generating cryptocurrency. WebCobra differs from a cryptocurrency miner by not performing the mining processes, itself, and, instead, has a flexible payload for running different mining software in various environments. This Trojan can cause significant performance and hardware longevity issues indirectly, and the users should have their anti-malware products delete WebCobra and its associated miners on sight.
A Snake that's Loaded with Two Poison Kinds
With cryptocurrency general's value rising, it's natural for threat actors to express more interest in deploying campaigns that take advantage of the profit from generating it. WebCobra is one of the deployment methods that they might use: a crypto jacker Trojan that doesn't make currency, itself, but sets up another threat for doing so. Currently, malware experts are only seeing two notable variations in how WebCobra does so, which it chooses depending on the environment that it's infecting.
The setup stage for WebCobra opens a password-protected archive, a DLL file (related to the payload's obfuscation), and a BIN with the primary payload. Besides employing a series of traditional anti-analysis protections for keeping security researchers from examining it, WebCobra also identifies the environment as either x86 or x64. WebCobra uses completely different mining mechanisms for each version of the operating system:
- For x86 systems, WebCobra injects the code for the Cryptonight miner into a svchost.exe process, which runs automatically and uses the majority of the PC's CPU resources for creating cryptocurrency.
- For x64 ones, WebCobra downloads the Claymore Zcash miner from a C&C server and launches it remotely. WebCobra only drops this threat into the systems with specific graphics processing units, including Asus, Nvidia and Radeon brands.
In some cases, malware experts are confirming the WebCobra's limited capacity for self-uninstalling some of its dropping components for the sake of disguising the infection's presence on the PC, but victims shouldn't rely on such features for their computer's safety.
Tracing the Tracks of Serpentine Trojans
WebCobra's development team is likely of being Russian, but active attacks using it against the public aren't limiting themselves to that region of the world. Instead, malware analysts are verifying noteworthy infection rates throughout the United States, South Africa and Brazil. The infections are using Potentially Unwanted Programs (PUPs) with modified installation routines for dropping WebCobra, along with any other programs, such as toolbars, adware, gaming applications, or Web-browsing extensions. The user's best symptom for noting the attack is the long-term instability and performance problems that most cryptocurrency miners provoke.
In the long term, WebCobra infections could cause failures of the central processing unit and other hardware due to overusing them continuously. However, regarding its UI, WebCobra shows no windows or other, self-evident characteristics of its being an active program. Let your traditional anti-malware solutions isolate and remove WebCobra, along with any unwanted installed miners, as soon as possible.
WebCobra comes with two tactics of attacks for two kinds of PCs and shows off how the criminals don't need to be highly specific about who they're harming. The chances are good and no matter what kind of OS you're running, some threat actor is interested in exploiting it for money.
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
* See Free Trial offer below. EULA and Privacy/Cookie Policy.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.