← Back to feed

McAfee Labs Uncovers Large-Scale Vibe-Coded Cryptominer Campaign: 443 Malicious ZIPs with LLM-Generated PowerShell Targeting Global Users

Date: 2026-04-02
TLP: TLP:CLEAR
Tags: vibe-coding, cryptominer, ai-generated-malware, dll-sideloading, infostealer

Executive Summary

McAfee Labs documented a large-scale cryptominer distribution campaign active in January 2026 where attackers used LLM-assisted 'vibe coding' to generate parts of the malicious PowerShell kill chain, distributing 443 malicious ZIP files across Discord, SourceForge, FOSSHub, and MediaFire impersonating AI tools, game mods, and software utilities. The campaign deployed WinUpdateHelper.dll via DLL sideloading, establishing persistence under the name 'Microsoft Console Host' and mining Ravencoin, Zephyr, and Monero. In some infections the final payload was SalatStealer or a Mesh Agent RAT. Defenders should alert on WinUpdateHelper.dll in non-system directories and monitor for anomalous cryptocurrency mining processes.

Campaign Summary

FieldDetail
Campaign / MalwareWinUpdateHelper Vibe-Coded Cryptominer Campaign
AttributionUnknown (confidence: none)
TargetGlobal consumer and enterprise users in the US, UK, India, Brazil, France, Canada, Australia; lured via fake AI tools, game mods, and software utilities
VectorMalicious ZIP files hosted on Discord, SourceForge, FOSSHub, MediaFire, and mydofiles.com; initial execution via ZIP archive containing sideloaded DLL
Statusactive
First Observed2024-12

Detailed Findings

According to McAfee Labs research published in March 2026 covering campaign activity from January 2026, researchers identified 443 malicious ZIP files in the wild, each disguised as software users actively search for — including AI image generators, voice-changing tools, stock-market trading utilities, game mods, graphics card drivers, VPNs, ransomware decryptors, and infostealer tools. McAfee noted early signs of the campaign trace back to December 2024.

Across the 443 ZIP files, McAfee identified 48 unique malicious WinUpdateHelper.dll variants. These 48 DLL variants break into 17 distinct kill chains, each with its own C2 infrastructure, yet sharing cryptocurrency wallet credentials — an operational security mistake that allowed researchers to follow the money across the entire campaign. Files were hosted across more than 100 active delivery URLs on trusted platforms including Discord, SourceForge, MediaFire, FOSSHub, and mydofiles.com.

The PowerShell code style was a key indicator of LLM assistance. McAfee researchers found explanatory comments and neatly structured sections consistent with LLM generation, including a comment reading 'Downloads cvtres.exe from your GitHub URL' where 'Your GitHub URL' appears to be an unfilled template placeholder left by the AI tool, indicating the attackers used vibe-coded scripts with minimal human review.

The malware establishes persistence by registering a Windows service named 'Microsoft Console Host' (mimicking a legitimate Windows process) set to run at each system boot. The subsequently downloaded PowerShell executes entirely in memory (fileless), removes older persistence entries, adds C:\ProgramData to Windows Defender's exclusion list, and deploys two coin miners: one CPU-based (Zephyr) and one GPU-based (Ravencoin), with rewards converted to Bitcoin for payout. In certain infections, the final payload is SalatStealer or a Mesh Agent remote access tool.

The C2 server employs evasion: it only delivers payloads to requests with a PowerShell user-agent and returns 301/404 to curl or browser-based requests; download URLs expire after approximately 60 seconds; and the C2 domain rotates every 58 days based on UNIX timestamps. McAfee traced Bitcoin wallet flows and identified at least 7 wallets associated with the operation containing over $4,500, with total received funds exceeding $11,000; the true amount is assessed as higher given privacy-coin mining.

MITRE ATT&CK Mapping

TechniqueIDContext
Hijack Execution Flow: DLL Side-LoadingT1574.002WinUpdateHelper.dll is sideloaded via a legitimate-looking executable in the malicious ZIP to execute the malicious payload without triggering AppLocker or standard execution controls.
Create or Modify System Process: Windows ServiceT1543.003The malware registers a Windows service named 'Microsoft Console Host' for persistence at system boot, masquerading as a legitimate Windows process.
Defense Evasion: Impair Defenses: Disable or Modify ToolsT1562.001The fileless PowerShell payload adds C:\ProgramData to Windows Defender's exclusion list to prevent detection of subsequently dropped files.
Resource HijackingT1496Deployed CPU and GPU cryptocurrency miners mine Zephyr (CPU) and Ravencoin (GPU), with proceeds converted to Bitcoin.
Obfuscated Files or InformationT1027Fileless in-memory PowerShell execution prevents disk-based detection; C2 server only responds to PowerShell user-agent to block researcher tools.

IOCs

Domains

mydofiles.com

Full URL Paths

_WinUpdateHelper.dll sample hash sourced from MalwareTips community analysis referencing the McAfee report (https://malwaretips.com/threads/vibe-coded-malware-is-here-how-a-lazy-prompt-turned-into-a-11-000-crypto-heist-a-very-in-depth-mcafee-lab-report.140383/). McAfee primary report at https://www.mcafee.com/blogs/other-blogs/mcafee-labs/ai-written-malware-vibe-coded-campaign/. The hash 94de95... is identified as the first WinUpdateHelper.dll sample. C2 domain mydofiles.com is a confirmed delivery host. 48 unique DLL variants exist; full hash list in McAfee report. Persistence artifact: Windows service named 'Microsoft Console Host'. Defender exclusion path: C:\ProgramData._

Splunk Format

"mydofiles.com"

File Hashes

94de957259c8e23f635989dd793cdfd058883834672b2c8ac0a3e80784fce819

Detection Recommendations

  1. EDR: Alert on creation of Windows services named 'Microsoft Console Host' from non-system installer processes; flag WinUpdateHelper.dll execution from any path outside C:\Windows\System32\. 2. AV/EDR: Add the published WinUpdateHelper.dll hash (94de957259c8e23f635989dd793cdfd058883834672b2c8ac0a3e80784fce819) to blocklists; McAfee has published 48 variants in the full report. 3. Windows Defender: Monitor the registry key HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths for new additions pointing to C:\ProgramData — this is an active evasion step in the kill chain (Sysmon Event ID 13). 4. Process: Alert on PowerShell processes executing from memory (no on-disk script file) spawned from a sideloaded DLL parent. 5. Network: Flag outbound connections to cryptocurrency mining pool domains (pool.hashvault.pro, etc.) and alert on GPU/CPU utilization spikes in process monitoring that correlate with xmrig, ravencoin-miner, or zephyr-miner process names. 6. Download Sources: Implement web proxy policies blocking direct downloads from mydofiles.com; consider alerting on ZIP file downloads from generic file-hosting CDNs (MediaFire, FOSSHub for non-approved software).

References