Post
Topic
Board Mining (Altcoins)
Re: [ANN] TeamRedMiner 0.3.8 - CNv8 - Vega 64 2200+h/s Rx470 1025+h/s Low Power Draw
by
kerney666
on 29/11/2018, 22:21:56 UTC
i would love to try this miner
checked windows download file and found something suspicious


Quote
Arcabit    Trojan.BZC.ONG.Pantera.13.0DC71EE4    20181129
BitDefender    Gen:Heur.BZC.ONG.Pantera.13.0DC71EE4    20181129
Comodo    Application.Script.Miner.A@7wv4f2    20181129
Cylance    Unsafe    20181129
Emsisoft    Gen:Heur.BZC.ONG.Pantera.13.0DC71EE4 (B)    20181129
GData    Gen:Heur.BZC.ONG.Pantera.13.1162CBC9    20181129
Kaspersky    not-a-virus:HEUR:RiskTool.Script.BitMiner.gen    20181129
MAX    malware (ai score=82)    20181129
Microsoft    PUA:Win32/CoinMiner    20181129
eScan    Gen:Heur.BZC.ONG.Pantera.13.0DC71EE4    20181129
Qihoo-360    Win32/Virus.Script.4bc    20181129
ZoneAlarm by Check Point    not-a-virus:HEUR:RiskTool.Script.BitMiner.gen    20181129

I know some of these are shown at all mining programs but the pantera thing is new to me.
Can anyone confirm this readout?

Well, it’s one of those very frustrating aspects of building a miner that you want people to use. You can google teamredminer yourself and you’ll start seeing repackaged malware versions from the second or third page, mostly in countries where the general public don’t speak English so they hang out on local forums where these copies are found. Those versions gets downloaded, scanned and reported, and here we are. Think we were clean for about two weeks after the CNv2 release, then the shitshow began Smiley.

All I can say is that the GitHub version will be clean from any type of malware and unwanted behavior, regardless of the heuristics that the virus scanners use to connect the clean version to the repackaged ones...