Compromised hosts may be used to mine cryptocurrency. This technique executes XMRig crypto miner and attempts to connect to a miner pool. It's important to monitor for the presence of cryptocurrency miners, as they may consume significant quantities of system resources.
View Command
To view this TTPs command, you must be logged in with a professional or enterprise license.