ZombieboyMiner controls 70,000 computers to mine Monero

ZombieboyMiner controls 70,000 computers to mine Monero

0x1 Overview
Tencent Yujian Threat Intelligence Center recently detected the latest activity of the mining Trojan family spread by ZombieboyTools. The Trojan modified the public hacking tool ZombieboyTools, and then packaged and used the NSA attack module in it to attack public and intranet IPs, and executed the Payload file x86/x64.dll on the infected machine, further implanting mining and RAT (remote access control) Trojans.

Vulnerability scanning attack tool ZombieboyTools


Tencent's Yujian Threat Intelligence Center disclosed the Zombieboy Trojan intelligence in December 2017, and its competitors also released related intelligence in May and July 2018.

In this report, we first analyze the C2 domain name fq520000.com and its samples registered and used by hackers on August 14, 2018. Then, by comparing the attack methods, malicious code features, C2 domain name, IP, and port features of the Zombieboy Trojan in several rounds of attacks, we infer that the source of the attacks belongs to the same gang, which is named the ZombieboyMiner gang .
Tencent Yujian Threat Intelligence Center monitored and found that the ZombieboyMiner Trojan has infected about 70,000 computers, and monitoring data shows that the virus is very active.

Anchacha ZombieboyMiner controls 70,000 computers to mine Monero
Mini Programs

Infected computers are distributed all over the country, with Guangdong, Jiangsu and Zhejiang ranking the top three.

Tencent Antu Advanced Threat Tracing System Query Gang Information

0x2 Detailed Analysis

The ZombieboyMiner attack process is as follows:

ZombieboyMiner attack process


Las.exe analysis <br />After running, it releases the port scanning tool, NSA exploit attack tool, and payload program to C:
\windows\IIS directory. Then use the port scanning tool to scan the machines with open port 445 in the LAN, and then use the NSA tool to inject the payload (x86.dll or x64.dll) into the machines in the LAN that have not yet fixed the MS17-010 vulnerability.

Sample release file

445 port scanning batch file

EternalBlue Configuration File

Doublepulsar Configuration File


Payload Analysis
The payload (x86.dll or x64.dll) downloads 123.exe from the C2 address ca.fq520000.com and executes it locally under the name sys.exe.

Payload behavior

sys.exe analysis
sys.exe downloads sm.fq520000.com:443:/1 and executes it with the file name las.exe

sys.exe behavior


At the same time, obtain the URL address from sm.fq520000.com:443:/A.TXT, use this address to download the RAT (Remote Access Control Trojan) and execute it with the file name 84.exe (currently 1.exe, 4~9.exe can be downloaded).

A. TXT content


CPUInfo.exe Analysis
CPUInfo.exe uses the Windows system program Srvany.exe to start up, and then acts as the main program to launch the attack process and the mining process.

White use Srvany.exe to start

svsohst.exe analysis
svsohst.ex is responsible for starting the Monero mining program crss.exe. Before starting the mining machine, it sets the mining pool address ad0.fq520000.com and the wallet.

44FaSvDWdKAB2R3n1XUZnjavNWwXEvyixVP8FhmccbNC6TGuCs4R937YWuoewbbSmMEsEJuYzqUwucVHhW73DwXo4ttSdNS is used as the mining parameter, and then the mining process is started through ShellExecute.

Set mining parameters

ShellExecute starts the mining machine

crss.exe analysis
crss.exe is a mining program compiled using the open source mining program XMRig 2.8.1.

Mining machine code

84.exe Analysis

The file copies itself to C:\Windows\System32\seser.exe, sets its hidden attribute and installs it as a service dazsks gmeakjwxo so that it can be started at boot.

RAT installation service starts automatically

Then the DLL file is decrypted and loaded for execution. The DLL file is actually the Zegost Trojan. After running, it will collect keystroke information and software installation information and send them to the C2 address dns.fq520000.org. It also has functions such as screen control and installation of executable files.

Detect antivirus software

Get key information

Decrypting C2 address

Communicating with C2

Sending and receiving messages

Receive and decrypt data

0x3 Correlation Analysis
We organized the early Zombieboy analysis reports released by Tencent Yujian since September 2017, the Zombieboy analysis reports released by competitors, and the NSASrvanyMiner analysis reports released by competitors into a timeline, and further
concluded through the consistency of attack methods, malicious code characteristics, C2 domain names and IP, and port characteristics: the attacks launched by the recently discovered and disclosed Zombieboy Trojans come from the same group.

Zombieboy Trojan Activity


0x3.1 Comparison of attack methods

In several attacks, the hacker tool Zombieboy was used to modify the NSA attack program. After the attack was successful, the payload file X86/X64.dll was executed, and the PDB information of the payload file contained the feature "Zombieboy".

At the same time, the payload code downloads 123.exe from the C2 address and executes it locally with the file name sys.exe, and then uses sys.exe as the Loader program to download its malicious components. After the Trojan enters the target machine, in addition to spreading attacks, the malicious behaviors include mining and installing RAT.

Zombieboy Trojan PDB

Payload code comparison

0x3.2 C2 Domain Name Comparison
0x3.2.1 Second-level domain name characteristics
C2 domain names are named with characters such as dns, ca, sm, ms, note, stop, etc. as secondary domain name prefixes.

C2 Domain List

In addition, the first-level C2 domain names registered from 2018.02.27 to 2018.05.21 have the characteristics of "AB, BA" in structure, such as posthash.org and hashpost.org, hashnice.org and nicehash (used as second-level domain name prefixes).
0x3.2.2 Domain name resolution IP address
The C2 domain names registered after 2018.02.27 have all been resolved to 59.125.179.217/211.23.160.235.
The IP location is shown as Banqiao District, New Taipei City, Taiwan. The fact that these domain names point to the same IP address at the same time indicates that they have a certain connection.

Reverse domain name


0x3.2.3 HFS port characteristics <br />HFS services used for Trojan downloads all use port 344/443. The port of the HFS service can be specified by the author at will. The use of the same or similar ports in these attacks may be the continuation of the same author's usage habits.
Parent Trojan download URL:

call.ppxxmr.org:344/123.exe
ca.posthash.org:443/123.exe
ca.hashpost.org:443/123.exe
ca.hashnice.org:443/123.exe
ca.fq520000.com:443/123.exe

0x4 Summary
Based on the group's attack methods, the types of malicious programs they spread, and the consistency of information such as IP, domain names, and ports used during the attack, we believe that the multiple rounds of attacks launched using Zombieboy since September 2017 came from the same group.

The gang constantly updates the C2 address as the Payload delivery address after the NSA attack. It also uses the registered secondary C2 domain name to build its own mining pool to mine Monero. At the same time, it implants RAT Trojans in the compromised machines, collects user sensitive information and uploads it to the Trojan server.

Based on the above characteristics, Tencent Yujian Threat Intelligence Center named the gang the ZombieboyMiner mining gang.

ZombieboyMiner mining and RAT information

0x5 Security Recommendations
1. The server closes unnecessary ports, such as ports 139 and 445.
2. To manually install the "EternalBlue" vulnerability patch, please visit the following page
https://technet.microsoft.com/zh-cn/library/security/ms17-010.aspx

For WinXP and Windows Server 2003 users, please visit
https://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598
3. Enterprise users are advised to install the Yudian Terminal Security Management System (https://s.tencent.com/product/yd/index.html) on the entire network. The Yudian Terminal Security Management System has comprehensive security management functions such as unified terminal antivirus control, unified vulnerability repair control, and policy control, which can help enterprise managers fully understand and manage the security status of the enterprise intranet and protect enterprise security.

4. Personal users are recommended to use Tencent PC Manager to intercept such virus attacks.

IOCs (partial)

IP:

211.23.160.235
61.216.5.103
59.124.90.231
211.23.47.186
50.63.202.58
59.125.179.217
59.124.20.39

Domain :

call.ppxxmr.org
cc.ppxxmr.org
stop1.ppxxmr.org
fr.ppxxmr.org
dns.ppxxmr.org
stop.ppxxmr.org
sm.ppxxmr.org
ca.ppxxmr.org
sm.posthash.org
stop.posthash.org
note.posthash.org
ca.posthash.org
nicehash.posthash.org
minero.posthash.org
note1.posthash.org
dns.posthash.org
rc.posthash.org
gx.posthash.org
note1.hashpost.org
sm.hashpost.org
note.hashpost.org
bf.hashpost.org
ca.hashpost.org
gx.hashpost.org
http.hashpost.org
nicehash.hashpost.org
dns.hashpost.org
5. hashpost.org
do.hashnice.org
www.hashnice.org
nicehash.hashnice.org
gx.hashnice.org
bf.hashnice.org
sm.hashnice.org
http.hashnice.org
dns.hashnice.org
ca.hashnice.org
note1.hashnice.org
gx.fq520000.com
gxx.fq520000.com
ad0.fq520000.com
ca.fq520000.com
ad2.fq520000.com
sm.fq520000.com
ms.fq520000.com
ad1.fq520000.com
tm.fq520000.com
dns.fq520000.com
dns.fq520000.org

MD5 :

60e12b9a39352d08bf069e2a97107ab0
a649ac8c7ec727488ef0d9def63be08b
118207ee176d8f457ff6900d0b787f58
309d97944338014443fb32490d7915bd
13af51ab2ce2e952c00a0ec668853d96
cf9e8e0b325b4c92887b1880eef09301
cb1e7e96cbaf88d787941fd077d8a95a
ed9d9121e71caa3c5622d168fc08fce7
d91fea937e6b45f2fae0ac3b08f963dc
e7ff22ca98abb20985970a824554573b
40ee69298c8b30e2a6e7d374074ea288
f9b393e672fac10314a3be7c54cdd133
735123203319136186d560f415b680e3
8b91142fed443c5003933643c2658d27
22f40fbedca7dbc11c59fab086677c8a
c23f115942306bb864090ae9296f0261
844379ece6f2e474c37154f87ccebfe8
440127ca1f6ec17c2e075a090d5fc372
807299345aedeba522c1039310ffc040
a245f6378e73d110bbf7f91c61194c89
060a95feb61fc1ce382f55ed4ab290f1
e92579c7b4a0611a13a96c91757eef62
a4b7b1390ca6d1d06a73468ff75b8ce9
d709a06941305b3841be9f261a5b7bd3
14729b1e5d035b74e21b358b2f0c807a
9dc13238b547456c2e834ac4b27a46d2
8effdbe3af3a1b122826933a37c9600d
6df1343cdf5aa088013415d7183c3a67
167f2d2bce1e332073c7ea259573f5f6
c72c5ed0dc0cff5ba371d9fc53c24e92
bd7838aaa61ec2238af00f0b122214e3
9564b8901fab74183589faeaa21f36bd
77239af9f7a80ff39d7495208f644add
3f30a7e8fd541db28bdf7fbfa3679511
84ba2fdc78e39d5cc8c48ce7e7f35edc
5d198bc36c92c17c2e9e6b9867fe8847
8afd9008665a8dcb9ba40718cfaf3b91
CBD91d483bc5d87b16938163e75ef67f
afbc1cf8c923eaba4f502a63e4032d06
c2ea69dfe33287e4aea88263cb26e3f1
b8e00a3df697e8a6b3fa5f9112398086
f42a3d28aa92fd13a57e509eae8f533c
fd42791fe4d3df9cb1cdf9a038e4cb23
f8551c8e432e8489ed29854abcdf734b
bb3737ab5fd70411c6ee6dce6cb2befe
e4e94f68d656333a596063af025cdc0b
f2da6781a11d490fdb388d4e017b54dd
b7df8964c6ccd2bdfd41f9ab88ca5ed5
842133ddc2d57fd0f78491b7ba39a34d
88d3e78635e0cbe0a2a9019a5c3cba58
07bee8068b3f528f5d46d7aaa1c945f9
343552e5075cfbf050435674d37ed636
2b909a339c385946f5a1e561e08ddda3
08a1e02e8e633c71f28ea35a457516a4
80d2274c1de9fcbc0df245fffd266530
79292189FB211042653601CC8E32AEA2
8c4f2a6d4f76038c67d9b12f3642d935
9a21d78f7fa9092cd1b809c152d92355
f55002267322498dc398b25059f4b64b
baf28e2e302d2834d7fba152d592b096
6a78576677e915d11bda114884dc7485
446320319eea2652c2af4321037def6c
8a1ba57a692c17830e03da141485835b
44343c1b5f0be42098b95d333c5d42d0
9a21d78f7fa9092cd1b809c152d92355
d0cebe62c0ddafa20ebe005fc9cbf4eb
dda5e64470c92911a6a382d48059d31a
3cdbe851346a13b04e32e93bc63ca9cf
79292189fb211042653601cc8e32aea2

<<:  AMD's crypto mining GPU sales fell in Q3

>>:  Mining disturbs people, the city of Plattsburgh in the United States will impose special taxes on miners

Recommend

Inventory: The most unreliable men’s faces!

The colorful life, the dazzling temptations, and ...

A person who can lower his posture when asking for help

Everyone needs help from others sometimes, but at...

What does Meme Coin bring to the current crypto market?

Data shows that traders are increasingly preparin...

How to dissolve and activate the beauty mole at the corner of mouth?

Traditional physiognomy covers a wide range, among...

Hong Kong RWA market changes: retail investors may be allowed to enter

April is hot, and various Web3 conferences are ga...

Do people with short and thick marriage lines have good marriages?

Managing a marriage is not an easy thing. It requ...

Career Line in Palmistry Palmistry can tell when your career will reach its peak

Career line in palmistry, palmistry can tell when...

Do people with widow's peaks have stubborn tempers and evil natures?

Generally, such people are often very difficult t...

What are the signs of a failed relationship?

Fate is not a short and illusory thing. The reaso...

Are women with thick waists destined to be busy all their lives?

Physical appearance will determine a person's...