Categories: Malware

Fileless Cryptocurrency Miner that affects Windows Machine Through WMI and EternalBlue

Nowadays Hackers Distributing Advanced Fileless Malware with Evasion capabilities which are very Difficult to Detect. Security experts from Trend Micro Identified a new crypto miner which uses Fileless malware Techniques.

It uses Windows Management Instrumentation for fileless persistence and uses scrcons.exe to execute its scripts. In order to enter into the system, it uses EternalBlue vulnerability – MS17-010.This combination makes malware more powerful.

Infection Chain of Fileless Malware

The infection flow of this cryptocurrency miner malware has many stages. The infection flow starts with MS17-010; the vulnerability is employed to drop and run a backdoor on the system (BKDR_FORSHARE.A), that installs numerous WMI scripts.

These scripts then connect with its C&C servers to urge directions and transfer the cryptocurrency miner malware besides its elements. Complete analysis report published by TrendMicro.

Once the javascript executed it connects with Multiple layers of C&C server, first stage hxxp://wmi[.]mykings[.]top:8888/test[.]html has instruction to download Miner also it has the address of other stages.

These are the following scripts used in triggering the malicious WMI script when the required conditions meet.

ActiveScriptEventConsumer is the persistence payload
__EventFilter class trigger the Event
__IntervalTimerInstruction Exposes Time Interval between Events
__AbsoluteTimerInstruction Event generated on specific time and date
__FilterToConsumerBinding Required for class registration

EternalBlue Malware Developed by National Security Agency (NSA) exploiting Windows based Server Message Block (SMBv1) and to be believed the tool has released by Shadow Brokers hackers Group in April 2017 and it has been used for Wannacry Cyber Attack.

Not all machines need the WMI service. If a machine doesn’t want access to WMI, disable it to eliminate the chance. Microsoft provides a tool which will trace WMI activity. SMBv1 also can be disabled to scale back the chance to users.TrendMicro recommended.

Common Defence’s to stay safe

  • Don’t open the attachments that you are not expecting.
  • Patch or Update your software.
  • Use a reputable security suite.
  • Download applications from Reputed sites.
  • Stay strict with CIA Cycle.
Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS and…

10 minutes ago

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol (RDP).…

2 hours ago

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that is…

3 hours ago

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek, a…

3 hours ago

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this update…

3 hours ago

DeepSeek is Now Available With Microsoft Azure AI Foundry

Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI Foundry…

4 hours ago