The illicit miner not only relays sensitive information back to hackers but even shuts down other competing mining malware on a victim device.