top of page

Wormable XMRig Campaign Leverages BYOVD and Timed Kill Switch for Stealth

  • Feb 23
  • 2 min read

Key Findings


  • Wormable cryptojacking campaign spreads through pirated software installers

  • Uses BYOVD (Bring Your Own Vulnerable Driver) technique to gain kernel-level access and boost mining performance

  • Includes a time-based "kill switch" set to December 23, 2025, triggering a controlled cleanup routine

  • Exhibits worm-like capabilities, spreading across external storage devices for lateral movement

  • Modular design separates monitoring features from mining, persistence, and privilege escalation payloads

  • Leverages a circular watchdog system to ensure components relaunch each other if terminated


Background


The campaign targets unsuspecting users with pirated software bundles, such as installers for popular productivity suites, to distribute a custom XMRig miner program. The malware's modular design and sophisticated infection chain demonstrate the continued innovation in commodity malware, blending social engineering, legitimate software masquerades, worm-like propagation, and kernel-level exploitation to create a resilient and efficient botnet.


Infection Chain


  • The campaign's entry point is the use of social engineering lures, advertising free premium software in the form of pirated installers

  • The malicious binary acts as the central orchestration node, serving different roles (installer, watchdog, payload manager, cleaner) throughout the infection lifecycle

  • It leverages a BYOVD (Bring Your Own Vulnerable Driver) technique, abusing the WinRing0x64.sys driver to gain kernel-level access and optimize mining performance

  • Payloads are embedded in the binary's resource section, decompressed, and disguised as legitimate software


Persistence and Spreading


  • The malware includes a circular watchdog system to ensure components relaunch each other if terminated

  • It even kills the real Windows Explorer process to disrupt users and maintain control

  • A worm module spreads the malware through USB drives, quietly listening for new removable devices and copying the malicious binary onto them


Kill Switch and Campaign Lifecycle


  • The malware includes a time-based "kill switch" set to December 23, 2025

  • Before the deadline, the malware proceeds with the standard infection routine, installing persistence modules and launching the miner

  • After the deadline, the binary is launched with a "self-destruct" argument, triggering a controlled decommissioning of the infection

  • This suggests the campaign is not intended to be indefinite, possibly timed to coincide with the expiration of rented C2 infrastructure, a predicted shift in the cryptocurrency market, or a planned transition to a new malware variant


Conclusion


This cryptojacking campaign demonstrates the ongoing evolution of commodity malware, leveraging advanced techniques like BYOVD and worm-like propagation to maximize the impact and evasiveness of the XMRig miner. The inclusion of a time-based kill switch further highlights the attacker's strategic planning, potentially signaling a transition to a new malware variant or infrastructure. The research serves as a reminder of the critical weaknesses in modern OS security models and the need for continued vigilance against innovative threats.


Sources


  • https://securityaffairs.com/188388/malware/wormable-xmrig-campaign-leverages-byovd-and-timed-kill-switch-for-stealth.html

  • https://thehackernews.com/2026/02/wormable-xmrig-campaign-uses-byovd.html

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page