Rewterz
Rewterz Threat Alert – Prometei Crypto-mining Botnet Exploits Windows SMB
July 23, 2020
Rewterz
Rewterz Threat Alert – SNOW Serves as Maze Loader in Active Campaigns
July 24, 2020

Rewterz Threat Alert – WatchBogMiner Targets Linux Servers’ RCE Vulnerabilities

Severity

Medium

Analysis Summary

WatchBogMiner Trojan launched a vulnerability attack and has controlled mining on tens of thousands of Linux servers. The Trojan uses remote code execution vulnerabilities in server components such as Nexus Repository Manager, Supervisord, ThinkPHP, etc. to attack, installs various types of persistent attack codes on the lost machine, and then implants Monero mining Trojans for mining. Based on the computing resources used by the Trojan, it is speculated that tens of thousands of Linux servers have been controlled by hackers. The Trojan saves malicious code through the third-party website Pastebin to avoid detection, and persists through various methods. It regularly pulls the mining Trojan and loads it into memory for execution. At the same time, it deletes the Trojan file after startup to achieve the purpose of “stealth”. Similar to other mining Trojans, WatchBogMiner will clear other mining Trojans to monopolize the server when mining.

The exploited vulnerabilities include CVE-2019-7238 – Nexus Repository Manager 3 Remote Code Execution Vulnerability, CVE-2017-11610 – Supervisord Remote Command Execution Vulnerability and CVE-2018-20062 – ThinkPHP Remote Code Execution Vulnerability.

Impact

  • Unauthorized code execution
  • Excessive CPU power consumption
  • Possible denial of service 

Indicators of Compromise

Domain Name

  • sadan666[.]xyz

MD5

  • 88b658853b9ececc48f5cac2b7b3f6f6
  • ad17226de6cc93977fb7c22c7a27ea8e

Source IP

  • 104[.]236[.]66[.]189

URL

  • https[:]//pastebin[.]com/raw/UhUmR517
  • https[:]//pastebin[.]com/raw/1eDKHr4r
  • https[:]//pastebin[.]com/raw/b5x1pRzK
  • http[:]//sadan666[.]xyz[:]9080/rr
  • https[:]//pastebin[.]com/raw/SjjWevTs
  • https[:]//pastebin[.]com/raw/tyjnTQTA
  • https[:]//pastebin[.]com/raw/SB0TYBvG
  • https[:]//pastebin[.]com/raw/Zkz0d9Jz
  • https[:]//pastebin[.]com/raw/mvSEGmR6

Remediation

  • Block the threat indicators at respective controls.
  • Keep all systems and software updated to latest patched versions against known security vulnerabilities.