Replies: 1 comment 1 reply
-
Unam has mentioned that he won't be sharing the repositories he has for those miners, because he does not have the time to manage more repositories at this time. He has also mentioned that setting up a build environment for those repositories can be very difficult, since you need a lot of different dependencies and such. I also might suspect that Unam does not want people changing the miners themselves, because he might take a fee of probably 1% when mining, which is of course super understandable since he spends so much time on these projects and helps whoever needs it. What you are saying about the miner getting detected once injected into another file might be correct. I have experienced that even after adding exclusions to windows defender, it sometimes gives the user a notification about a threat process "svchost.exe" (or whatever process you chose it to inject into, I also tested conhost.exe, cmd.exe and explorer.exe). Windows defender also mentions that the threat has been stopped, however the miner was still running, so that was a little confusing. I ended up adding my own exclusion which points to svchost.exe, and I also added a part that disables notifications from windows defender. I would like if there was an option to inject the miner into itself, instead of having to choose between external executables to inject into. That the miner just ran standalone. @UnamSanctam would this be possible for the next update? Anyways, you could maybe crypt the miners in SilentCryptoMiner>Resources>Miners here and then build the project. |
Beta Was this translation helpful? Give feedback.
-
Hello, you've already answered that the ethminer and xmrig files are changed executables based on these two repositories:
https://github.com/ethereum-mining/ethminer
https://github.com/xmrig/xmrig
Can you provide the repository of these two files, or at least a repository of a basic construct to create these files?
The problem I see is that these prebuild files are the ones that everyone else uses. So even if I get the whole software fud, as soon as the miner starts infecting the target file, there is a high chance that these two files get flagged, or am I wrong? Even if there would be a crypter that maybe could work, it would be more sustainable to modify the repository, create your own build and after that use a crypter if necessary.
Beta Was this translation helpful? Give feedback.
All reactions