The AhnLab Security Intelligence Center (ASEC) has identified a new strain of backdoor malware that works with a Monero coin miner, utilizing the PyBitmessage library for covert P2P communications. This malware uses encryption to secure data exchanges and anonymize identities, complicating detection by security tools. It decrypts resources using XOR operations to deploy a Monero miner and a backdoor component. The Monero miner exploits the cryptocurrency's anonymity, while the backdoor, created with PowerShell, installs PyBitmessage and retrieves files from GitHub or a Russian file-sharing platform. Commands are executed as PowerShell scripts, making detection difficult. The malware may be distributed as legitimate software or cracked files. ASEC advises caution with unverified files and recommends keeping security solutions updated.
Indicators of Compromise (IOCs):
- MD5: 17909a3f757b4b31ab6cd91b3117ec50
- MD5: 29d43ebc516dd66f2151da9472959890
- MD5: 36235f722c0f3c71b25bcd9f98b7e7f0
- MD5: 498c89a2c40a42138da00c987cf89388
- MD5: 604b3c0c3ce5e6bd5900ceca07d587b9
- URLs:
- http://krb.miner.rocks:4444/
- http://krb.sberex.com:3333/
- http://pool.karbowanec.com:3333/
- http://pool.supportxmr.com:3333/
- https://spac1.com/files/view/bitmessage-6-3-2-80507747/