Crypto Mining Malware: Hijacking Your Resources for Profit

Summary:
Crypto mining malware has become a significant threat as cybercriminals exploit users’ devices to mine cryptocurrencies like Zephyr Coin. This malware operates stealthily, often using obfuscation techniques to evade detection, and can severely impact device performance. Users must be vigilant and adopt security measures to protect their systems from such exploitation.
#CryptoMining #ZephyrCoin #MalwareThreat

Keypoints:

  • Crypto mining involves using computer power to validate transactions on a blockchain and earn cryptocurrency.
  • Malicious actors exploit users’ devices through phishing and deceptive downloads to install mining software.
  • Installed mining software can drain CPU and GPU resources, leading to device slowdowns and potential hardware damage.
  • Zephyr Coin prioritizes privacy and security, allowing users to earn rewards through a proof-of-stake system.
  • The malware spreads through various formats, including Visual Basic Script, Batch Processing Files, PowerShell Scripts, and Portable Executables.
  • Malware employs techniques to create exclusions in Windows Defender to avoid detection.
  • The malware establishes persistence by creating services and scheduled tasks to ensure continuous operation.
  • It connects to mining pools to mine Zephyr coins and adds the mined coins to specified wallet addresses.
  • Regular software updates and strong anti-virus protection are essential for mitigating risks associated with crypto mining malware.

  • MITRE Techniques:

  • Command and Control (T1071): Utilizes multiple command and control domains to maintain communication with compromised systems.
  • Persistence (T1547): Establishes persistence through service creation and scheduled tasks.
  • Defense Evasion (T1562): Adds exclusions to Windows Defender to prevent detection.
  • Execution (T1203): Executes malicious scripts and executables to initiate mining activities.
  • Credential Dumping (T1003): Uses system resources to mine cryptocurrency while avoiding detection.

  • IoC:

  • [domain] 2miners.com
  • [url] hxxp[:]//37.1.196.35/un2/botui.dat
  • [file name] printui.exe
  • [file name] printui.dll
  • [file name] pyld.dll
  • [file name] console_zero.exe
  • [file name] x310586.dat
  • [file name] x638273.dat
  • [wallet address] ZEPHs8rW7aS82Z52aS3qh35jPcaYKHdrufzLCCCyXmqdFC8wRPpCTdLgoA1CaqJDa72zG8ZhsMmdMZyJkqDTadbSPbwt1s2ppYr
  • [wallet address] ZEPHs7Ep8zTafTpfMEduqd5xGYLEvBJwcHXRpbA92fMjVJcji9EXQsDP5QQLVxmn7UTSTFqpmaVdE2ydBwupJctU2ggmsNvqxfd

  • Mitigation:

  • Regularly update software to protect against vulnerabilities.
  • Utilize strong anti-virus software with real-time protection and periodic scans.
  • Limit administrative privileges to prevent unauthorized installations.
  • Monitor resource usage to identify unusual CPU and GPU activities.
  • Configure firewalls to block unauthorized outbound connections to known mining pools.

  • Full Research: https://blogs.quickheal.com/crypto-mining-malware-zephyr/