Meet “Norman” – a new variant of monero-mining malware that employs crafty tricks to avoid being spotted.

The malicious code was identified by researchers at data security firm Varonis when investigating a crypto-miner infestation at a “mid-size company.”

“Almost every server and workstation was infected with malware. Most were generic variants of cryptominers. Some were password dumping tools, some were hidden PHP shells, and some had been present for several years,” the firm said.

However, one miner stood out – Norman, as the team dubbed it.

Norman’s payload has two primary functions: execute its XMRig-based crypto-miner and avoid detection.

After injection, it overwrites its entry in explorer.exe to conceal evidence of its presence. It also stops operating the miner when the PC’s user opens Task Manager (see image below). Re-injecting itself once Task Manager is not running.

The miner element of the malware is based on the openly available XMRig code hosted on GitHib. However, Varonis found that its monero (XMR) address is blocked by the mining pool it links to, and hence is effectively disabled.

The researchers further found a PHP shell, possibly linked to Norman, that “that continually connects to a command-and-control (C&C) server.” Web shells can allow remote access to a system on which they are installed.

However, the team found that, when they ran the code, it entered a loop awaiting commands and none had been received at time of writing.

The report also notes that Norman may have been created in France or a French-speaking nation. “The SFX file had comments in French, which indicate that the author used a French version of WinRAR to create the file,” said Varonis.

Hat tip: TNW

Cat in a box image via Shutterstock; gif animation via Varonis