// case type
cryptojacking
unauthorized miner on endpoint / cloud workload — CPU/GPU baseline drift + persistence + outbound pool traffic.
start here · primary tools
ordered. work top-down. the first tool is the suggested entry point for this case type.
- process tree rebuilderdrop a memory dump · scan EPROCESS pool tags · reconstruct parent/child process tree · flag orphaned and suspicious chains · export CSV · runs locally
- memory pe extractordrop a memory dump · scan for PE headers · carve embedded executables · rebuild PE structure · download extracted files · runs locally
- memory entropy analyzermemory dump · shannon entropy per block · heatmap · high-entropy regions · hex dump · csv + png export · runs locally
- in-memory malware configuration extractordrop process memory dump · xor decode json xml config blocks · c2 ip port campaign mutex extraction · multi-technique local scan · runs locally
- network beaconing detectordrop connection logs or PCAP · statistical analysis of connection intervals per host · jitter detection · C2 beaconing patterns · periodic callback identification · export CSV · runs locally
- beaconing pattern detectordrop pcap or zeek conn log · periodic c2 beacon intervals · regularity and jitter scores · export csv · runs locally
- dns query analyzerdrop a PCAP or paste DNS log · extract queries · detect DGA patterns · DNS tunneling · high-frequency domains · suspicious TLDs · export CSV · runs locally
- c2 callback interval analyzerdrop pcap or zeek conn log · deep interval stats · c2 framework timing profiles · jitter estimation · export csv · runs locally
also useful · secondary tools
supporting and follow-up tools. surface as the investigation widens.
- windows scheduled task analyzerdrop task scheduler xml · triggers · actions · principals · suspicion score · encoded powershell decode · persistence hints · runs locally
- registry autoruns & services parserdrop NTUSER.DAT · SOFTWARE · or SYSTEM hive · parse Run keys · services · scheduled load points · flag suspicious paths · export CSV · runs locally
- linux persistence analyzerdrop linux artifact files · identify all persistence mechanisms · rc.local · systemd units · cron · authorized keys · ld.so.preload · profile scripts · runs locally
- case report generatorfill in case number · examiner · dates · findings · drop evidence files for auto hash · generates structured forensic report PDF · runs locally
run as a stack
skip the click-through. these presets are curated forensic pipelines you can save as a stack with one click and run on your evidence locally.
cryptojacking — beacon kit
8 stepsdrop process + network + DNS logs → ancestry → beacon detect → DNS timeline → persistence → report
- 01evidence-manifest-generatorhash log exports before analysis
- 02process-ancestry-reconstructorreconstruct process parent-child chains for miner processes
- 03network-beaconing-pattern-detectordetect periodic beaconing to mining pools
- 04host-beaconing-detectorhost-level beacon interval analysis
- 05dns-log-analyzerDNS query analysis for pool domain resolution
- 06scheduled-task-deletion-detectordetect scheduled-task tampering for miner persistence
- 07registry-autorun-removal-detectordetect autorun key removal — anti-forensics after miner install
- 08case-report-generatordraft a report identifying miner persistence + pool infrastructure