Monday, November 25, 2024
HomeMalwareFileless Cryptocurrency Miner that affects Windows Machine Through WMI and EternalBlue

Fileless Cryptocurrency Miner that affects Windows Machine Through WMI and EternalBlue

Published on

Nowadays Hackers Distributing Advanced Fileless Malware with Evasion capabilities which are very Difficult to Detect. Security experts from Trend Micro Identified a new crypto miner which uses Fileless malware Techniques.

It uses Windows Management Instrumentation for fileless persistence and uses scrcons.exe to execute its scripts. In order to enter into the system, it uses EternalBlue vulnerability – MS17-010.This combination makes malware more powerful.

Infection Chain of Fileless Malware

The infection flow of this cryptocurrency miner malware has many stages. The infection flow starts with MS17-010; the vulnerability is employed to drop and run a backdoor on the system (BKDR_FORSHARE.A), that installs numerous WMI scripts.

- Advertisement - SIEM as a Service
Fileless Malware

These scripts then connect with its C&C servers to urge directions and transfer the cryptocurrency miner malware besides its elements. Complete analysis report published by TrendMicro.

Once the javascript executed it connects with Multiple layers of C&C server, first stage hxxp://wmi[.]mykings[.]top:8888/test[.]html has instruction to download Miner also it has the address of other stages.

Fileless Malware
Fileless Malware

These are the following scripts used in triggering the malicious WMI script when the required conditions meet.

ActiveScriptEventConsumer is the persistence payload
__EventFilter class trigger the Event
__IntervalTimerInstruction Exposes Time Interval between Events
__AbsoluteTimerInstruction Event generated on specific time and date
__FilterToConsumerBinding Required for class registration

EternalBlue Malware Developed by National Security Agency (NSA) exploiting Windows based Server Message Block (SMBv1) and to be believed the tool has released by Shadow Brokers hackers Group in April 2017 and it has been used for Wannacry Cyber Attack.

Not all machines need the WMI service. If a machine doesn’t want access to WMI, disable it to eliminate the chance. Microsoft provides a tool which will trace WMI activity. SMBv1 also can be disabled to scale back the chance to users.TrendMicro recommended.

Common Defence’s to stay safe

  • Don’t open the attachments that you are not expecting.
  • Patch or Update your software.
  • Use a reputable security suite.
  • Download applications from Reputed sites.
  • Stay strict with CIA Cycle.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...