logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Alert – Advanced Attack Tools Target Non-patched Systems to Distribute Cryptocurrency Miners

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – Rhadamanthys Stealer – Active IOCs
    Severity Medium Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
    Severity High Analysis Summary The Mirai botnet is a type of malware that infects Internet of Things (IoT) devices, such as routers, security cameras, and other […]
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – LockBit Ransomware – Active IOCs
    Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Alert – Advanced Attack Tools Target Non-patched Systems to Distribute Cryptocurrency Miners

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – Rhadamanthys Stealer – Active IOCs
    Severity Medium Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
    Severity High Analysis Summary The Mirai botnet is a type of malware that infects Internet of Things (IoT) devices, such as routers, security cameras, and other […]
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – LockBit Ransomware – Active IOCs
    Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Advisory – HP Service Manager Multiple Security Bypass Vulnerabilities
June 14, 2019
Rewterz
Rewterz Threat Alert – Nanocore RAT Resurfaces with Fresh Indicators of Compromise
June 14, 2019

Rewterz Threat Alert – Advanced Attack Tools Target Non-patched Systems to Distribute Cryptocurrency Miners

June 14, 2019

Severity

Medium

Analysis Summary


A new cyber attack campaign targets organizations around the world to spread a cryptocurrency miner for monetary purposes. The vector of this campaign is a variant of Vools (Trojan.Win32.VOOLS.SMAL01), which is an EternalBlue-based backdoor used to deliver cryptocurrency miners and other malware.

Analysts found that all of the compromised machines were running outdated versions of Microsoft Windows OS so they were still vulnerable to already patched vulnerabilities.

Many other tools were also found in the infected systems, mainly the password dumping tool Mimikatz and Equation group tools. The final payload deployed on compromised systems is a cryptocurrency miner. Researchers also found that compromised systems appear to be on internal segments of compromised networks.

The retrieved sample seems to be an installer which sends an HTTP request to the following server:
log.boreye[.]com/ipc.html?mac={MAC address}&ip={IP address}&host={host}&tick=6min&c=error_33

Another common thing among compromised machines is that there was a file located in the main Windows folder of all the infected machines:
C:\Windows\NetworkDistribution\Diagnostics.txt. The file extension .txt is meant to avoid detection. The file actually is a ZIP archive file that contains several files (the Equation toolkit components).

All these files are variants of the open-source XMRig (Monero) miner.

The usernames used are very similar and all of them use the same password, which means the threat actor is the same. The miner always uses the name dllhostex.exe. Furthermore, the binary is always located either in the “system32” or in the “SysWOW64” folder of the infected Windows machine, depending on the miner variant.
Roughly 83% of affected computers were running Windows Server 2003 SP2. (outdated)
South Asian countries like China, India and Vietnam are among the top targets and the targeted industries include education, communication and media, banking, manufacturing, and technology.

Impact

  • Financial Loss
  • Credential Theft
  • Information Disclosure

Indicators of Compromise

URLs

  • miniast[.]com
  • tenchier[.]com
  • boreye[.]com
  • pilutce[.]com

Malware Hash (MD5/SHA1/SH256)

  • ca7db2d555e67ba1f4560e68d5bc5b09 
  • 95786b6c28bf8dba7bbfeeba9e1ec27a 
  • 6dc722c9844e61427a47a2759a8fbec0 
  • 24f18c1c0f6df20f3c3e56eea5462e00 
  • f830f3004d4637f7ad9c61719a301d18 
  • 5138bcdab5d4282aed717ad1aa6de3d4 
  • 1263f5d06fd1859a4b3924c850bbf96c 
  • 291ae5d31b83ac269e9c0bb9025ee098 
  • 9fa4dbd6bbff6e96f54039a93dae8f22 
  • 297c855681a872f80aada938f60ef33a 
  • 928e86560d1e5a4765fdb8562a265f41 
  • 740e94f902e4d364615eb10a00c3ff31 
  • 5a7de0c6a03b02da8dea170c1e8259f5 
  • 7715e7b35ccf6a2d3ad0df6baff37abd 
  • 62fa403ff17613d0c42f793a41ada4a9 
  • 50462805c6843cff49378c5c3f3b4557 
  • 5910ad6f2d82357f4a97240f77376bea 
  • 0e02555ede71bc6c724f9f924320e020 
  • f7d7778f4bc5878abb4189557d1e4472 
  • c0f1f909331dbaab57dc6345e925ee6c 
  • 81a07515af6f2663b7bcfb2eec407af7 
  • a3cc9566f6f9f23a03a87b778b6f2a6e 
  • 830cf47825cce3b24ad80d5e80113aee 
  • a013bc89f72c0c343a32adb6d6a2342e 
  • 56da116d25207847797fe5f8b085c1b1 
  • 120dafffdb96a6032ba1e22056c26738 
  • be97f6bb2c385eaaa780661381c485ec 
  • 0cf2f1207d9fd85573f6c0e7f9e7d6a9 
  • f5a7b1f998390241f5c10cbddfe88647 
  • 9f34a7aa58700746bf20dc153c61e21d 
  • c61b2dfc2a87a5d73882f1a9b0437887 
  • 5bcfdaa021a6f47283d50fbf509843e9 
  • 268f7cc5ffc830238fc55984aca4fc39 
  • 35e65bd53c04a71c487c9f2660824efc 
  • dc932f52466f4cca3e246a3016ce988e 
  • d9356b4e0df28ff65ba22f9a69f1e150 
  • c694d4999f5a99cba82638c2dfbb3a95 
  • 0dd098c63e35d68cd99d9bbc798391b5 

Remediation

  • Block the threat indicators at respective controls.
  • Keep all systems up-to-date and patched against all known vulnerabilities.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo