Pornographic malspam pushes coin miner malware

Published: 2017-12-11
Last Updated: 2017-12-11 02:40:51 UTC
by Brad Duncan (Version: 1)
3 comment(s)


On Saturday 2017-12-09 and Sunday 2017-12-10, I came across a wave of malicious spam (malspam) with links to a Bitcoin miner disguised as pornographic material.  The emails all had the same links.  One of them was off-line by the time I checked, but the other downloaded a zip archive named  Windows Defender quickly caught and deleted the malware, so people aren't really at risk for this.  However, I wanted to document this campaign with a quick diary.


The emails had various subject lines, spoofed senders, and different first paragraphs in the message text.  I submitted an example in the .eml format to VirusTotal (link). The emails each contained a different pornographic image followed by the message text.  The second paragraph in each message text read the same, stating:

Maybe you want see my private XXX photo??? Ooooohhhh.... ok! Just download archive from this link and open and install it. And you can get access to some my hot photos )))

It was followed by a link to: hxxp://martialartsbenefits[.]com/

Shown above:  Screenshot from one of the emails (minus the pornographic image).

Shown above:  Downloaded zip archive and the extracted file.

Windows Defender identified the malware as Trojan:Win32/Tiggre!rfn, but that didn't describe the malware for me.  A quick check on VirusTotal indicates the malware is a Bitcoin miner.  Running the malware on a Windows host in my lab environment confirmed Bitcoin miner-style traffic, and it appears to be based on CPUminer Multi version 1.1.

Shown above:  Windows Defender quickly caught the file when I tried downloading it on 2017-12-10.

Shown above:  VirusTotal indicates the downloaded file is a coin miner.

Shown above:  Traffic from an infection filtered in Wireshark indicates this is CPUminer Multi version 1.1.


Emails noted:

  • Date/Time:  Sunday, 2017-12-10 00:08 UTC
  • From:  "Isabelle" <>
  • Subject:  That's why I love our parties! Just look here
  • Date/Time:  Sunday, 2017-12-10 16:28 UTC
  • From:  "Martine" <>
  • Subject:  I would go through the streets slack-jawed
  • Date/Time:  Sunday, 2017-12-10 18:04 UTC
  • From:  "Birgit" <>
  • Subject:  Oh Gooood, it is the hottest of all that I've ever seen Just look here!
  • Date/Time:  Sunday, 2017-12-10 19:14 UTC
  • From:  "Manon" <>
  • Subject:  Is your character as hard as your muscles?
  • Date/Time:  Sunday, 2017-12-10 23:10 UTC
  • From:  "Lola" <>
  • Subject:  Even your eyes can tell me how confident you are.

Links in the emails:

  • hxxp://khudermunkh[.]mn/cgi/
  • hxxp://martialartsbenefits[.]com/


SHA256 hash:  922784709d4054db9df7149b3b0d17ba310b4c3b3ba5ca4d41f1f460d318dd83

  • File size:  2,201,826 bytes
  • File name:
  • Description:  Downloaded zip archive

SHA256 hash:  28f18837d7a60d8a5d90b96c48a104996fcfb4a710b8abcfe1449607d101dd67

  • File size:  2,339,166 bytes
  • File name:  Open and see my XXX photo and Video.exe
  • Description:  Extracted Windows executable - Bitcoin mining malware

Traffic from an infected Windows host:

  • port 8005 - - CPUminer traffic

Final words

Windows 10 hosts seem well-protected against this threat.  As always, on older versions of Windows, system administrators and the technically inclined can implement best practices like Software Restriction Policies (SRP) or AppLocker to prevent these types of infections.

Brad Duncan
brad [at]

3 comment(s)


The screenshots of Windows Explorer's warning messages when 1. attempting to open the downloaded .ZIP and 2. attempting to extract or run the executable are missing!

JFTR: the attachment manager was introduced with Windows XP Service Pack 2 more than 13 years ago.
I'm not finding anything wrong with the images... I've tried it from different browsers/computers from different IP addresses, and there all appear just fine. Let me know if you're still having trouble viewing the images.
You misunderstood: current mail clients and web browsers all add the "mark-of-the-web" to attachments saved to disk or files downloaded to disk, and Windows builtin ZIP shell extension propagates it to every file it extracts.
When you "open" such a file in Windows Explorer you get a warning message.
In your example you get 3 warnings: a first one when opening the ZIP, the second when extracting the EXE, and the third when opening the EXE.
Their screenshots are missing!


Diary Archives