M
Critical RiskWindows
minerd.exeEXECUTABLE

minerd.exe - CPU Cryptocurrency Miner (Cryptominer) [2026]

minerd.exe is a CPU-based cryptocurrency miner. Almost always indicates unauthorized cryptomining activity when found on enterprise systems. High-priority indicator of compromise.

4viewsLast verified: Jan 18, 2025

Risk Summary

## Risk Summary | Factor | Assessment | |--------|------------| | Detection Difficulty | Low | | Abuse Potential | Critical | | Prevalence | Common in attacks | | Risk Score | 95/100 | minerd.exe is a cryptocurrency miner that is almost never legitimate in enterprise environments.

Overview

What is minerd.exe?

minerd.exe is a CPU-based cryptocurrency mining application, part of the cpuminer project. It mines cryptocurrencies like Monero, Bitcoin, and others using CPU resources.

Key Characteristics

AttributeValue
File Nameminerd.exe
TypeCryptocurrency Miner
CategoryCryptojacking Tool
Typical Size500KB - 2MB
OriginOpen-source cpuminer project

Technical Details

PropertyDescription
Process TypeUser Application
CPU UsageVery High (near 100%)
Network ActivityMining pool connections
Legitimate UsePersonal mining (rare)

minerd.exe is the classic CPU miner and its presence on enterprise systems is almost always malicious.

Normal Behavior

Normal Behavior

When Legitimately Used

# Legitimate mining (rare in enterprise)
minerd.exe -a scrypt -o stratum+tcp://pool.example.com:3333 -u wallet -p x

# Common arguments
-a [algorithm]     Algorithm (sha256d, scrypt, etc.)
-o [url]           Mining pool URL
-u [user]          Pool username/wallet
-t [threads]       Number of CPU threads

Expected Characteristics (If Legitimate)

AspectExpected Behavior
User ContextDeliberate user installation
CPU Usage90-100% (by design)
NetworkMining pool connections
LocationUser-controlled directory

Important: Legitimate use in enterprise environments is extremely rare.

Common Locations

C:\Users\<user>\Downloads\minerd.exeC:\Temp\minerd.exeC:\ProgramData\minerd.exeC:\Windows\Temp\minerd.exe

Suspicious Indicators

Suspicious Indicators

Red Flags (Almost Always Malicious)

IndicatorConcern LevelDescription
Presence on systemCriticalAlmost always unauthorized
Enterprise environmentCriticalNever legitimate in corp
Hidden locationCriticalAttempting to evade detection
Running as serviceCriticalPersistence mechanism
Renamed binaryCriticalEvasion attempt

Cryptojacking Indicators

Cryptojacking Signs:
- High sustained CPU usage
- Fan noise/system slowdown
- Network to mining pools
- Unknown scheduled tasks
- Process with mining arguments

Common Mining Pools

Pool DomainCryptocurrency
pool.minexmr.comMonero
xmrpool.euMonero
pool.supportxmr.comMonero
stratum.*Various

Abuse Techniques

Abuse Techniques

Cryptojacking Attack

Typical Attack Flow:
1. Initial compromise (phishing, exploit)
2. Download minerd.exe
3. Configure for attacker wallet
4. Establish persistence
5. Mine cryptocurrency continuously
6. Resources stolen from victim

Deployment Methods

MethodImplementation
DropperMalware downloads miner
Exploit KitAuto-downloads after exploit
Supply ChainBundled with compromised software
InsiderIntentional installation

Evasion Techniques

:: Common evasion methods
rename minerd.exe svchost.exe
minerd.exe --cpu-priority 1  (Lower priority to avoid detection)
taskkill when user active, restart when idle

Persistence Methods

Persistence Mechanisms:
- Scheduled task
- Registry Run key
- Service installation
- Startup folder
- WMI subscription

Remediation Steps

Remediation Steps

Immediate Actions

# Kill miner processes
Get-Process | Where-Object { $_.Name -match "minerd|xmrig|miner" } | Stop-Process -Force

# Find and remove
Get-ChildItem -Path C:\ -Recurse -Filter "minerd.exe" -ErrorAction SilentlyContinue | Remove-Item -Force

# Check scheduled tasks
Get-ScheduledTask | Where-Object { $_.Actions.Execute -match "miner|stratum" }

# Check services
Get-Service | Where-Object { $_.PathName -match "miner" }

Remove Persistence

# Remove scheduled tasks
Get-ScheduledTask | Where-Object { $_.Actions.Execute -match "miner" } | Unregister-ScheduledTask -Confirm:$false

# Check Run keys
Get-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" |
    Where-Object { $_ -match "miner" }

# Remove services
Get-Service | Where-Object { $_.PathName -match "miner" } | Stop-Service
sc.exe delete "MinerService"

Full Remediation

StepAction
1Kill all miner processes
2Remove miner files
3Remove persistence
4Block mining pools
5Investigate initial access
6Full malware scan

Investigation Checklist

Investigation Checklist

Initial Triage

  • Confirm minerd.exe presence
  • Identify all miner processes
  • Check CPU usage patterns
  • Network connections to pools?

Scope Assessment

  • How many systems affected?
  • When did mining start?
  • What is the wallet address?
  • How much was mined?

Persistence Check

  • Scheduled tasks?
  • Registry Run keys?
  • Services created?
  • Startup folder entries?

Root Cause

  • Initial access vector?
  • Related malware?
  • User responsible?
  • Vulnerability exploited?

Evidence Collection

# Collect evidence
Get-Process | Where-Object { $_.CPU -gt 80 } | Export-Csv miners.csv
netstat -an | findstr ":3333 :14444" > connections.txt
Get-ScheduledTask | Export-Csv tasks.csv

MITRE ATT&CK Techniques