• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Lazarus DTrack – IOC’s
November 28, 2019
Rewterz Threat Alert – New DeathRansom Ransomware Successfully Encrypts Victim’s Files
November 28, 2019

Rewterz Threat Alert – KingMiner Cryptocurrency Mining Malware

November 28, 2019

Severity

High

Analysis Summary

Blasting attacks against weak SQL passwords are resurfacing as KingMiner miners have controlled tens of thousands of computers. KingMiner variant is a Monero coin mining Trojan that performs a blasting attack against a Windows server MSSQL. Attackers have used a variety of evasion techniques to bypass the virtual machine environment and security detection, which caused some anti-virus engines to fail to detect it accurately. The current version of KingMiner has the following features: 
1.     Blasting attacksagainst MSSQL 
2.     Use WMI timers and Windows scheduled tasks for persistent attacks
3.     Shut down the RDP service on the machine with the CVE-2019-0708 vulnerability to prevent other mining groups from invading and monopolize the controlled computer mining resources
4.     Use base64 and specific encoded XML , TXT , PNG files to encrypt Trojan horse programs
5.     Using the signature files of Microsoft and several well-known manufacturers as the parent process, “white + black” starts the Trojan DLL .

bc67a9e27a0b2363cce40865fd937339.png

The attack uses the Windows privilege escalation vulnerability CVE-2019-0803. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode and then install programs; view, change, or delete data; or create users with full user rights New account.

Impact

  • Crypto-currency mining
  • Unauthorized Access
  • Privilege Escalation
  • Remote Code Execution

Indicators of Compromise

Hostname

  • 4056[.]309cffdae[.]tk
  • aa[.]30583fdae[.]tk
  • news.g23thr[.]com
  • q.112adfdae[.]tk
  • w.30713fdae[.]tk
  • 5921[.]1d28ebfdae[.]com
  • w.homewrt[.]com
  • 3843.1d28ebfdae[.]com
  • ww33.3096bfdae[.]com
  • a.1b051fdae[.]tk
  • 3023.309cffdae[.]tk
  • q.30583fdae[.]tk
  • a.qwerr[.]ga
  • w.ddff1[.]tk
  • 5311.1d28ebfdae[.]com

MD5

  • e3accf5a6f58932e56192bfbcbf0804c
  • c874dbb6bf3664990b57d07d7d220ee6
  • 78b56b92c2e7a42520fb99a84d78cf92
  • b0ab674b842822358be8cd5f6dc91554
  • 2b702a22963448c164db26807a308d50
  • be45959bc043a4fe88351cd03289f240
  • c568d6028735cdc2a1ddd3c01f14ca80
  • 21048ff02894656b5b24d4ed3c8a2882
  • 465373b74d163028add70f0d2b0966d0
  • 7def058c5d2acb660f394d04b4698580
  • 23ef4da80f6985a78c4a59467ac4612f
  • 88a5c4645c2a9d0481fd0a846e49b773
  • 4d910cb71c2f55bde48521f7ae062da4
  • 20e502ff977b336d9e7785186b16c68a

SHA-256

  • 9714ea73cb7d5515e33c14718e47eea2db6bf52cd5371422e663a96ec03af9ee
  • bddaca596cb8b29b314c380b0fa42566a3d7e669506b3a0dc645bf6da51146dd
  • e780de64c5a571d14eed791bc70d462f8724e2d54c8494b37085cefe7816db54
  • e0a4c175db246124881405010af97b08abb60889a41f4080ede7bdd160a8469b
  • 3902d0bfbb18ba27084713bdda1ccb23f19934f6621df70ac11aed0b6ee4efb3
  • 5359884aa9fa78763e46a6aa86d4796dfb1bbb3533026cf324166e55d8a4e4e9
  • 1f7c6f11af601500c50b5ad04e0952aa835c54aba0c85dd62875eab34d0150b1
  • c235c44e7904d04c5bd0db76d9b55eb53f0fdb8631a1c9eb6ca3d2bc6494ab02
  • 995108745ef411df25b7cf47d4609d12e4408e674ca6fd882114cd5c19e2bf01
  • f92387df7c80e7e379a02f118cbdb5643151da3a99e61270ca890ce62bca82d9
  • 5bbb40df52745e6762b1b216df692a72ac0491f473b979b22fd310fcbddc114c
  • 46131dedf1962a9bda9035eee75058e60d5725d45afb5ea74c614a33f6083b8a
  • 0fb48695bb5796c214958868ed0d6fdd0ebd2b9c9ad0e273549c442a0b7f8006
  • de9a4dc5507eb4bdcdcb173313e55fc3091a93e270b9bd10c28fc4d8cca84093

Source IP

  • 107.154.161[.]209
  • 95.179.131[.]54
  • 107.154.158[.]39

URL

  • hxxp[:]//w.30713fdae[.]tk/32a1[.]zip
  • hxxp[:]//w.homewrt[.]com:9761
  • hxxp[:]//95.179.131[.]54:9761
  • hxxp[:]//32a1[.]zip/64a1.zip
  • hxxp[:]//w.30713fdae[.]tk/32tl.zip
  • hxxp[:]//w.homewrt[.]com:9761
  • hxxp[:]//95.179.131[.]54:9761
  • hxxp[:]//32a1[.]zip/64a1.zip
  • hxxp[:]//w.30713fdae[.]tk/32tl.zip

Remediation

  • Block the threat indicators at their respective controls.
  • Fix the elevation of privilege vulnerability CVE-2019-0803.
  • Reinforce the SQL Server and patch server security holes. Use a secure password policy and strong passwords.
  • Modify the default port of the SQL Server service, change the default 1433 port setting based on the original configuration, and set the access rules to reject 1433 port detection.
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.