SSH zombie host mining Trojan warning

Source: Internet
Author: User

SSH zombie host mining Trojan warning

XMR (Monroe coin) is one of the current electronic currencies such as bitcoin. With its anonymity, support for CPU mining, and high prices, it is favored by "black market. Hansi has developed a general mining mode by using Internet servers, as well as multiple mining backend Update servers. The attack and mining methods show that the black industry organization has stepped up from last year in terms of mutual competition and Trojan updating.

Monroe currency price trend chart

Event Description

Recently, hackers used SSH to crack the server and planted mining Trojans. We tracked multiple background Update servers.

The process of attacking servers and planting mining Trojans includes three steps:

1. Attackers can detect SSH services.

2. Attackers crack SSH service accounts and passwords.

3. Once the brute-force cracking succeeds, attackers can remotely download and run the mining program.

It is a mining Trojan background server. It can be seen that the server 116.196.120.20 has been downloaded January 26, 2018 times since on January 1, 1277. During its monitoring process, it is found that various programs are also frequently updated.

Where:

1. Program Carbon is the actual mining program.

2. The xm. sh file is a shell program executed after successfully logging on to the server.

This Code includes three parts:

  • Attackers first kill other mining programs to ensure their own benefits. Note: The competition in the black market is becoming increasingly fierce.
  • Remotely download the corresponding mining program from the server.
  • Configure the mining pool and wallet address, and execute the mining program.

3. the xmm. sh file is the updated shell program. Compared with xm. sh, the mining pool link is modified. The goal is to select a mine pool with higher computing power.

4. procedure 1. ps1 is similar to xm in windows. sh script program also implements three similar functions. First, kill other mining programs, then remotely download the corresponding mining program on the server, and finally configure the mining pool and wallet address, execute the mining program.

5.program server.exe is a remote control Trojan program that connects to dx.777craft.com: 7777 after execution.

Competition among mining hackers is becoming increasingly fierce

Compared with the previous mining Trojans of the same type, this mining Trojan has been further improved in code. The mining script found earlier mainly kills the specific process name, currently, the mining process is mainly killed based on the ore pool information, which expands the effective scope. Comparison between two types of mining Trojans to kill other Trojans:

Hacker profit Estimation

According to the wallet address obtained from the current sample, the previous coin mining pool has submitted 34 XMR files to the attacker's wallet (about $8500, calculated at $250 of the current price ). However, the remaining seven XMR files in the wallet have been frozen due to the illegal mining of botnets identified by the mining pool:

Therefore, the attacker killed his previous mining program and registered a new wallet address for mining. The current wallet amount for the new address is as follows, we can see that a new mining address has been modified 15 days ago.

Based on the current information, the attacker has traced the access information and wallet addresses of more than 10 servers. The attacker has controlled at least 30 thousand hosts and obtained more than 300 Monroe coins, the current XMR (Monroe coin) price is nearly $0.1 million.

Mining IoC:

IP Address:

116.196.86.246: 7800

116.196.120.20: 7800

210.76.63.207: 3721

182.18.22.71: 80

Domain:

Dx.777craft.com: 7777

Wallet address:

Bytes

Bytes

This article permanently updates link: https://www.bkjia.com/Linux/2018-02/150997.htm

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.