Analysis of T-Rex CoinMiner Attacks Targeting Internet Cafés in Korea
A series of attacks targeting Korean Internet cafés have been identified, focusing on systems with specific management software installed. The threat actor, active since 2022, uses Gh0st RAT for system control and ultimately installs T-Rex CoinMiner for cryptocurrency mining. The initial access method remains unknown. The attacks involve memory patching of management software and use of downloaders. The malware suite includes Gh0st RAT, its droppers, patchers, downloaders, and T-Rex CoinMiner. Unlike typical coin mining operations using XMRig for Monero, this actor employs T-Rex, likely due to the presence of high-performance GPUs in Internet café PCs. The attacks have been ongoing since late 2024, prompting responses from management software manufacturers.
AI Analysis
Technical Summary
The T-Rex CoinMiner campaign targets Internet cafés in Korea by compromising systems running specific management software. Active since late 2024, the threat actor employs a multi-stage malware suite beginning with Gh0st RAT, a remote access trojan used for persistent system control. The initial infection vector remains unknown, but the attack involves memory patching of the management software and the use of downloaders to deploy additional payloads. Unlike common cryptocurrency mining malware that typically uses XMRig for Monero mining, this actor uses T-Rex CoinMiner, optimized for GPUs, reflecting the high-performance graphics hardware found in Internet café PCs. The malware suite includes Gh0st RAT, its droppers, patchers, downloaders, and the T-Rex miner itself. This approach allows the attacker to covertly mine cryptocurrency while maintaining control over compromised systems. The campaign’s focus on Internet cafés suggests targeting environments with multiple high-end GPUs, maximizing mining efficiency. Management software vendors have responded to the threat, but no patches or mitigations have been publicly detailed. The campaign does not currently have known exploits in the wild beyond the described activity, and the initial infection vector remains unclear, complicating detection and prevention efforts.
Potential Impact
For European organizations, the direct impact of this campaign may be limited due to its current targeting of Korean Internet cafés and the use of region-specific management software. However, the tactics and malware components, such as Gh0st RAT and T-Rex CoinMiner, are globally relevant and could be adapted to similar environments in Europe, particularly in Internet cafés, gaming centers, or other venues with high-performance GPU setups. The presence of Gh0st RAT enables attackers to maintain persistent remote access, potentially leading to data exfiltration, espionage, or further lateral movement within networks. The cryptocurrency mining activity can degrade system performance, increase electricity costs, and reduce hardware lifespan. If adapted to European targets, organizations could face operational disruptions and increased costs. Additionally, the use of memory patching complicates detection by traditional antivirus solutions, increasing the risk of prolonged undetected compromise.
Mitigation Recommendations
European organizations, especially those operating Internet cafés or similar environments with GPU-intensive systems, should implement targeted mitigations beyond generic advice. These include: 1) Conducting thorough inventory and monitoring of management software versions and configurations to detect unauthorized memory modifications or patching attempts. 2) Deploying endpoint detection and response (EDR) solutions capable of identifying behaviors associated with Gh0st RAT, such as unusual network connections or process injections. 3) Implementing network segmentation to isolate management software systems and limit lateral movement. 4) Monitoring GPU usage patterns for anomalies indicative of unauthorized mining activity. 5) Applying strict application whitelisting to prevent execution of unauthorized downloaders or droppers. 6) Enhancing logging and alerting on suspicious downloader activity and unexpected changes in system memory. 7) Collaborating with software vendors to obtain and apply any forthcoming patches or security advisories related to the management software. 8) Educating staff on recognizing signs of compromise and enforcing strong access controls to reduce risk of initial infection.
Affected Countries
South Korea, Germany, United Kingdom, France, Netherlands, Poland
Indicators of Compromise
- ip: 121.147.158.132
- hash: 04840bb2f22c28e996e049515215a744
- hash: 0b05b01097eec1c2d7cb02f70b546fff
- hash: 142b976d89400a97f6d037d834edfaaf
- hash: 15ba916a57487b9c5ceb8c76335b59b7
- hash: 15d6f2a36a4cd40c9205e111a7351643
- hash: 763e688e886d11cd8a64c0100c4fcf213a12fd44
- hash: d6941403b9c589ddf0c08e40e7a14021d67134d2
- hash: b46a32f1e37499aaf7a13fa3826b45bba49f268929a565c127761a40cfb84e80
- hash: d172c757fe0f095054704ef5449dc2c95f98d1385cf50a28932de6c5484cc67c
- ip: 103.25.19.32
- ip: 112.217.151.10
- ip: 113.21.17.102
- ip: 115.23.126.178
- ip: 121.67.87.250
- ip: 122.199.149.129
Analysis of T-Rex CoinMiner Attacks Targeting Internet Cafés in Korea
Description
A series of attacks targeting Korean Internet cafés have been identified, focusing on systems with specific management software installed. The threat actor, active since 2022, uses Gh0st RAT for system control and ultimately installs T-Rex CoinMiner for cryptocurrency mining. The initial access method remains unknown. The attacks involve memory patching of management software and use of downloaders. The malware suite includes Gh0st RAT, its droppers, patchers, downloaders, and T-Rex CoinMiner. Unlike typical coin mining operations using XMRig for Monero, this actor employs T-Rex, likely due to the presence of high-performance GPUs in Internet café PCs. The attacks have been ongoing since late 2024, prompting responses from management software manufacturers.
AI-Powered Analysis
Technical Analysis
The T-Rex CoinMiner campaign targets Internet cafés in Korea by compromising systems running specific management software. Active since late 2024, the threat actor employs a multi-stage malware suite beginning with Gh0st RAT, a remote access trojan used for persistent system control. The initial infection vector remains unknown, but the attack involves memory patching of the management software and the use of downloaders to deploy additional payloads. Unlike common cryptocurrency mining malware that typically uses XMRig for Monero mining, this actor uses T-Rex CoinMiner, optimized for GPUs, reflecting the high-performance graphics hardware found in Internet café PCs. The malware suite includes Gh0st RAT, its droppers, patchers, downloaders, and the T-Rex miner itself. This approach allows the attacker to covertly mine cryptocurrency while maintaining control over compromised systems. The campaign’s focus on Internet cafés suggests targeting environments with multiple high-end GPUs, maximizing mining efficiency. Management software vendors have responded to the threat, but no patches or mitigations have been publicly detailed. The campaign does not currently have known exploits in the wild beyond the described activity, and the initial infection vector remains unclear, complicating detection and prevention efforts.
Potential Impact
For European organizations, the direct impact of this campaign may be limited due to its current targeting of Korean Internet cafés and the use of region-specific management software. However, the tactics and malware components, such as Gh0st RAT and T-Rex CoinMiner, are globally relevant and could be adapted to similar environments in Europe, particularly in Internet cafés, gaming centers, or other venues with high-performance GPU setups. The presence of Gh0st RAT enables attackers to maintain persistent remote access, potentially leading to data exfiltration, espionage, or further lateral movement within networks. The cryptocurrency mining activity can degrade system performance, increase electricity costs, and reduce hardware lifespan. If adapted to European targets, organizations could face operational disruptions and increased costs. Additionally, the use of memory patching complicates detection by traditional antivirus solutions, increasing the risk of prolonged undetected compromise.
Mitigation Recommendations
European organizations, especially those operating Internet cafés or similar environments with GPU-intensive systems, should implement targeted mitigations beyond generic advice. These include: 1) Conducting thorough inventory and monitoring of management software versions and configurations to detect unauthorized memory modifications or patching attempts. 2) Deploying endpoint detection and response (EDR) solutions capable of identifying behaviors associated with Gh0st RAT, such as unusual network connections or process injections. 3) Implementing network segmentation to isolate management software systems and limit lateral movement. 4) Monitoring GPU usage patterns for anomalies indicative of unauthorized mining activity. 5) Applying strict application whitelisting to prevent execution of unauthorized downloaders or droppers. 6) Enhancing logging and alerting on suspicious downloader activity and unexpected changes in system memory. 7) Collaborating with software vendors to obtain and apply any forthcoming patches or security advisories related to the management software. 8) Educating staff on recognizing signs of compromise and enforcing strong access controls to reduce risk of initial infection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/88245"]
- Adversary
- null
- Pulse Id
- 6840aeddc28c5d119100354d
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip121.147.158.132 | — | |
ip103.25.19.32 | — | |
ip112.217.151.10 | — | |
ip113.21.17.102 | — | |
ip115.23.126.178 | — | |
ip121.67.87.250 | — | |
ip122.199.149.129 | — |
Hash
Value | Description | Copy |
---|---|---|
hash04840bb2f22c28e996e049515215a744 | — | |
hash0b05b01097eec1c2d7cb02f70b546fff | — | |
hash142b976d89400a97f6d037d834edfaaf | — | |
hash15ba916a57487b9c5ceb8c76335b59b7 | — | |
hash15d6f2a36a4cd40c9205e111a7351643 | — | |
hash763e688e886d11cd8a64c0100c4fcf213a12fd44 | — | |
hashd6941403b9c589ddf0c08e40e7a14021d67134d2 | — | |
hashb46a32f1e37499aaf7a13fa3826b45bba49f268929a565c127761a40cfb84e80 | — | |
hashd172c757fe0f095054704ef5449dc2c95f98d1385cf50a28932de6c5484cc67c | — |
Threat ID: 6840e82a182aa0cae2c66207
Added to database: 6/5/2025, 12:43:22 AM
Last enriched: 7/7/2025, 3:11:36 AM
Last updated: 8/9/2025, 4:55:30 PM
Views: 19
Related Threats
Phishing Attack: Deploying Malware on Indian Defense BOSS Linux
MediumExposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
Medium650 Attack Tools, One Coordinated Campaign
MediumStatistics Report on Malware Targeting Windows Web Servers in Q2 2025
MediumStatistics Report on Malware Targeting Windows Database Servers in Q2 2025
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.