Rewterz
Rewterz Threat Alert – TA428 Group Taking Advantage of Recent Conflict between Iran and USA
January 13, 2020
Rewterz
Rewterz Threat Advisory – CVE-2020-3940 – VMware Workspace ONE SDK information disclosure Vulnerability
January 13, 2020

Rewterz Threat Alert – Active Cryptomining Worm

Severity

High

Analysis Summary

An active cryptomining worm attack installing a cryptominer. These attacks appear to be targeting vulnerable Exim, Confluence, and WebLogic servers. After the system is compromised, a deployment BASH script is downloaded and executed. If the system is already infected, the script terminates the mining processes. It then checks the known_hosts file for other potential hosts to infect. Next it downloads an ELF binary named “omelette” and another BASH script called “sesame”. Downloading takes place through wget, curl, python2/3, or php, whichever is available on the infected system. Infection can take place on x86, x86-64, and AArch64 architectures and appropriate binaries are available for each. A cron job that runs sesame every five minutes provides persistence. If the system utilizes systemd, a service called “cloud-agent” is created as well. The miner deployed is a modified version of an open-source XMRig Monero miner.

Impact

  • Theft of Cryptocurrency
  • Network-wide infection 
  • Financial loss

Indicators of Compromise

IP

  • 51[.]15[.]56[.]161
  • 51[.]38[.]133[.]232

MD5

  • 21a9cac30458fb4dbf190df3edea965a
  • b120c895e8e78102b1ee1904ace11899
  • c6f69418ed39df7557a3d4c07793a923

SHA-256

  • 716042b8e32cfb364b04c4e068a37a8e60c928e4fd32c894282c5d658c138684
  • e2964214fdbfb51d5b33944cc9ca05821518a4bad01f750cee8f0d00f68a6176
  • f00258815853f767d70897db7263f740b161c39ee50c46c26ab247afb824459a

SHA1

  • 84a8a72ba58851c2810204f0ec444fec0ab7f895
  • 2bd781029bd373f45ff0965c81c543d15014d2eb
  • 81815d6a730a891d377d4f128ca3d66379bb76c8

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.
  • Keep all software updated to latest patched versions against known security vulnerabilities.