Thursday, March 28, 2024

KingMiner Malware Targets Windows Servers and Uses 100% CPU To Mine Monero

KingMiner malware targets Windows server and utilizes entire CPU resources to mine Monero. The malware primarily targets Microsoft Servers using IIS\SQL.

The malware was first identified in June 2018, security researchers form Checkpoint detected new version of KingMiner with significant that bypass several detection engines.

KingMiner malware gains access to the machines by using brute force method to download Windows Scriptlet file (.sct) on the victim’s machine.

KingMiner malware

Then it will detect the CPU architecture of the infected machine and downloads the XML payload file based on the CPU architecture. The downloaded zip file includes five files.

config.json – XMRig CPU miner configuration file.
md5.txt – Text file containing only the string “zzz.”
powered.exe (called fix.exe in older versions) – The main executable file.
soundbox.dll/soundbox.dll – DLL files containing functions to be exported by powered.exe.
x.txt/y.png – Binary blob files. Note – This is not a real PNG file.

Researchers said the powered.exe is executed, then it creates XMRig miner and appends key on the registry, and executes functions from DLL files.

The function King1 decodes the binary blob file x.txt & y.png, which is the modified version of the XMRig CPU miner.

The XMRig CPU Miner designed to consume only 75% of the CPU resource but it consumes of 100%. The malware is evolving constantly and it has placeholders for future operations or upcoming updates which will make this malware even harder to detect.

Related Read

Powerful Mobile Malware Rotexy Launched over 70,000 Attacks with Banking Trojan & Ransomware Modules

$60 Million Worth Cryptocurrencies Stolen Hackers From Japanese Cryptocurrency Exchange

Bittrex Cryptocurrency Exchange Delist the Bitcoin Gold After They Declined to Pay 12,372 BTG for Cyber Attack

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles