Home Malware Programs Trojans Trojan.Win32.CoinStealer.i

Trojan.Win32.CoinStealer.i

Posted: April 11, 2014

Threat Metric

Ranking: 8,747
Threat Level: 8/10
Infected PCs: 11,444
First Seen: April 11, 2014
Last Seen: October 3, 2023
OS(es) Affected: Windows


Trojan.Win32.CoinStealer.i is a Trojan that steals BitCoin wallet contents and has rapidly been identified as a new point of drama in the ongoing legal and financial issues surrounding the Mt. Gox website. At this time, Trojan.Win32.CoinStealer.i's main distribution point is a hacked blog at Magicaltux.net, which currently is distributing Trojan.Win32.CoinStealer.i's installer inside of an archive that also provides extensive technical information on the website's database and various leaks. If you've opened this file, labeled MtGox2014Leak.zip, malware experts warn that you should immediately use anti-malware tools to remove Trojan.Win32.CoinStealer.i and double-check your BitCoin wallet for any unauthorized access.

When the Free Market Frees You from Your Money

BitCoin has been a hot point of contention between currency libertarians and proponents of fiscal regulation, but its philosophical underpinnings recently have been overshadowed by its vulnerability to threat attacks. Trojan.Win32.CoinStealer.i is one of the newest Trojans designed to empty out the BitCoin wallets of its victims and shows few differences from previous iterations of other BitCoin thieves – except for its showy mode of distribution. Malware researchers confirmed that the blog of the CEO of the now-defunct Mt. Gox, the BitCoin-trafficking site infamous for massive security breaches and database leaks, currently is being used to install Trojan.Win32.CoinStealer.i.

Mark Karpeles' blog website was subjected to a typical hacking attack. Rather than inserting an invisible attack, misguided persons opted to create a post providing seemingly real information on Gox database leaks inside of a ZIP archive. However, this archive also included threatening files related to the installation of Trojan.Win32.CoinStealer.i. Since BitCoin owners are most likely to be reading this blog in the first place, Trojan.Win32.CoinStealer.i's function for gathering BitCoin currency is extremely well-targeted, although malware researchers have yet to ascertain the total number of compromised PCs.

Keeping Your Bits out of a BitCoin Thief's Grasp

With continuing BitCoin attacks by Trojans like Trojan.Win32.CoinStealer.i, Win32:BitCoinMiner-CA, Skodna.BitCoinMiner.AD and the BitCrypt Ransomware, investors in cryptocurrency should be particularly cautious about potential efforts to compromise their wallets. Malware researchers consider competent and updated anti-malware protection to be the simplest way to block a file installing Trojan.Win32.CoinStealer.i or similar threats. However, this particular campaign also shows how high-end business owners and employees need to pay attention to their websites and keep their security updated to stop any attempts to inject threatening content.

If there's one thing malware experts can praise Trojan.Win32.CoinStealer.i for doing, it is for increasing awareness of how closely interconnected the unregulated BitCoin currency is with different threat campaigns. With a multitude of Trojans already taking advantage of BitCoin, and more such PC threats anticipated for the future, any investors in this currency should be particularly watchful for any signs of harmful changes to their computers – or their funds.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\Adobe (x86)\desktop.exe File name: desktop.exe
Size: 17.4 KB (17408 bytes)
MD5: 3745e7d03914a446953c886a18d20c5a
Detection count: 77
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Adobe (x86)
Group: Malware file
Last Updated: January 16, 2017
%APPDATA%\Adobe (x86)\AcroRd32.exe File name: AcroRd32.exe
Size: 72.19 KB (72192 bytes)
MD5: 4c3bd3eaa231550ffbc4865424ef82fc
Detection count: 65
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Adobe (x86)
Group: Malware file
Last Updated: January 16, 2017
%APPDATA%\Adobe (x86)\AcroRd32.exe File name: AcroRd32.exe
Size: 63.48 KB (63488 bytes)
MD5: 4e5e2d3c73a48530b0b790456e0fabea
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Adobe (x86)
Group: Malware file
Last Updated: January 16, 2017
MtGox2014Leak.zip File name: MtGox2014Leak.zip
Mime Type: unknown/zip
Group: Malware file
TibanneSocket.exe File name: TibanneSocket.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%TEMP%\java12.exe

Additional Information

The following directories were created:
%APPDATA%\Adobe (x86)
Loading...