Skip to main content

Analysis of T-Rex CoinMiner Attacks Targeting Internet Cafés in Korea

Medium
Published: Wed Jun 04 2025 (06/04/2025, 20:38:53 UTC)
Source: AlienVault OTX General

Description

A series of attacks targeting Korean Internet cafés have been identified, focusing on systems with specific management software installed. The threat actor, active since 2022, uses Gh0st RAT for system control and ultimately installs T-Rex CoinMiner for cryptocurrency mining. The initial access method remains unknown. The attacks involve memory patching of management software and use of downloaders. The malware suite includes Gh0st RAT, its droppers, patchers, downloaders, and T-Rex CoinMiner. Unlike typical coin mining operations using XMRig for Monero, this actor employs T-Rex, likely due to the presence of high-performance GPUs in Internet café PCs. The attacks have been ongoing since late 2024, prompting responses from management software manufacturers.

AI-Powered Analysis

AILast updated: 07/07/2025, 03:11:36 UTC

Technical Analysis

The T-Rex CoinMiner campaign targets Internet cafés in Korea by compromising systems running specific management software. Active since late 2024, the threat actor employs a multi-stage malware suite beginning with Gh0st RAT, a remote access trojan used for persistent system control. The initial infection vector remains unknown, but the attack involves memory patching of the management software and the use of downloaders to deploy additional payloads. Unlike common cryptocurrency mining malware that typically uses XMRig for Monero mining, this actor uses T-Rex CoinMiner, optimized for GPUs, reflecting the high-performance graphics hardware found in Internet café PCs. The malware suite includes Gh0st RAT, its droppers, patchers, downloaders, and the T-Rex miner itself. This approach allows the attacker to covertly mine cryptocurrency while maintaining control over compromised systems. The campaign’s focus on Internet cafés suggests targeting environments with multiple high-end GPUs, maximizing mining efficiency. Management software vendors have responded to the threat, but no patches or mitigations have been publicly detailed. The campaign does not currently have known exploits in the wild beyond the described activity, and the initial infection vector remains unclear, complicating detection and prevention efforts.

Potential Impact

For European organizations, the direct impact of this campaign may be limited due to its current targeting of Korean Internet cafés and the use of region-specific management software. However, the tactics and malware components, such as Gh0st RAT and T-Rex CoinMiner, are globally relevant and could be adapted to similar environments in Europe, particularly in Internet cafés, gaming centers, or other venues with high-performance GPU setups. The presence of Gh0st RAT enables attackers to maintain persistent remote access, potentially leading to data exfiltration, espionage, or further lateral movement within networks. The cryptocurrency mining activity can degrade system performance, increase electricity costs, and reduce hardware lifespan. If adapted to European targets, organizations could face operational disruptions and increased costs. Additionally, the use of memory patching complicates detection by traditional antivirus solutions, increasing the risk of prolonged undetected compromise.

Mitigation Recommendations

European organizations, especially those operating Internet cafés or similar environments with GPU-intensive systems, should implement targeted mitigations beyond generic advice. These include: 1) Conducting thorough inventory and monitoring of management software versions and configurations to detect unauthorized memory modifications or patching attempts. 2) Deploying endpoint detection and response (EDR) solutions capable of identifying behaviors associated with Gh0st RAT, such as unusual network connections or process injections. 3) Implementing network segmentation to isolate management software systems and limit lateral movement. 4) Monitoring GPU usage patterns for anomalies indicative of unauthorized mining activity. 5) Applying strict application whitelisting to prevent execution of unauthorized downloaders or droppers. 6) Enhancing logging and alerting on suspicious downloader activity and unexpected changes in system memory. 7) Collaborating with software vendors to obtain and apply any forthcoming patches or security advisories related to the management software. 8) Educating staff on recognizing signs of compromise and enforcing strong access controls to reduce risk of initial infection.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/88245"]
Adversary
null
Pulse Id
6840aeddc28c5d119100354d
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip121.147.158.132
ip103.25.19.32
ip112.217.151.10
ip113.21.17.102
ip115.23.126.178
ip121.67.87.250
ip122.199.149.129

Hash

ValueDescriptionCopy
hash04840bb2f22c28e996e049515215a744
hash0b05b01097eec1c2d7cb02f70b546fff
hash142b976d89400a97f6d037d834edfaaf
hash15ba916a57487b9c5ceb8c76335b59b7
hash15d6f2a36a4cd40c9205e111a7351643
hash763e688e886d11cd8a64c0100c4fcf213a12fd44
hashd6941403b9c589ddf0c08e40e7a14021d67134d2
hashb46a32f1e37499aaf7a13fa3826b45bba49f268929a565c127761a40cfb84e80
hashd172c757fe0f095054704ef5449dc2c95f98d1385cf50a28932de6c5484cc67c

Threat ID: 6840e82a182aa0cae2c66207

Added to database: 6/5/2025, 12:43:22 AM

Last enriched: 7/7/2025, 3:11:36 AM

Last updated: 8/9/2025, 4:55:30 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats