Malware

Fileless Cryptocurrency Miner that affects Windows Machine Through WMI and EternalBlue

Nowadays Hackers Distributing Advanced Fileless Malware with Evasion capabilities which are very Difficult to Detect. Security experts from Trend Micro Identified a new crypto miner which uses Fileless malware Techniques.

It uses Windows Management Instrumentation for fileless persistence and uses scrcons.exe to execute its scripts. In order to enter into the system, it uses EternalBlue vulnerability – MS17-010.This combination makes malware more powerful.

Infection Chain of Fileless Malware

The infection flow of this cryptocurrency miner malware has many stages. The infection flow starts with MS17-010; the vulnerability is employed to drop and run a backdoor on the system (BKDR_FORSHARE.A), that installs numerous WMI scripts.

These scripts then connect with its C&C servers to urge directions and transfer the cryptocurrency miner malware besides its elements. Complete analysis report published by TrendMicro.

Once the javascript executed it connects with Multiple layers of C&C server, first stage hxxp://wmi[.]mykings[.]top:8888/test[.]html has instruction to download Miner also it has the address of other stages.

These are the following scripts used in triggering the malicious WMI script when the required conditions meet.

ActiveScriptEventConsumer is the persistence payload
__EventFilter class trigger the Event
__IntervalTimerInstruction Exposes Time Interval between Events
__AbsoluteTimerInstruction Event generated on specific time and date
__FilterToConsumerBinding Required for class registration

Common Defence’s to stay safe

  • Don’t open the attachments that you are not expecting.
  • Patch or Update your software.
  • Use a reputable security suite.
  • Download applications from Reputed sites.
  • Stay strict with CIA Cycle.
To Top

Pin It on Pinterest

Share This