
SonicWall Capture Labs Threat Research team has observed a Coin Miner using multi-component approach.
Malware is delivered to victims as a self-extracting archive file which drops following two files:
nur.bat starts initially and makes provision for additional malware download and execution besides removing infection footprints. It uses wmine.exe to download OS specific additional malware file from remote location:
noloadnof.cab contains a Base64 encoded executable file named “noloadn.crt” which is decrypted onto local storage as noloadn.exe, then executed.
Following command used to decrypt noloadn.exe :
Here noloadn.exe is an archive file packed using UPX 3.95. This noloadn.exe contains files such as, grim20.ime, grim40.ime, inst.bat, intl.bat, intlu.exe, mnzk12.dat, msletni.ime, nirco.exe, Resmin.exe, restr.exe, Ring, vget.exe.

Fig1: commands present in nur.bat

Fig2: Relationship between coin miner’s multiple components
Following modifications are observed on the system after execution:
Files added:
Registries added:
SonicWall Capture Labs provides protection against this threat with the following signature:
Indicators of Compromise (IOC):
Following are multiple components dropped by malware:
| FileName | Md5 |
| nur.bat | 8eefcaeed48be4eb4d6470330ccc24bf |
| wmine.exe | a9ff569c7cc92998180b0a5f9acac852 |
| intelrp.exe | 11831c3dc5941b909a86d83211f0d591 |
| renim.exe ( 32 bit ) | 34611952dbbac503d1f1bdda5f5e5522 |
| renim.exe ( 64 bit ) | 4f0fca816bedb8f99ce764c1bff2e7df |
| grim20.ime | 5dcbf2fb0043e0e7432f916ecbdd11e0 |
| grim40.ime | 425c2312cc45d22a187ee433a09f4179 |
| inst.bat | 95e74880eb068314055507540b25a0a0 |
| intl.bat | a322567b0553638fc9b9bd8d74e112c5 |
| intlu.exe | f3ca8234f60eba24604b5a9390d2fed5 |
| mnzk12.dat | 7829cb080d780f419ade0f031a66a985 |
| msletni.ime | b3bf512ffa11df457ed8c0c9b3c8133d |
| nirco.exe | ba07f81d94c84bfbae096b304a3a9206 |
| Resmin.exe | e88cd2ecd091f6170e70eb73e90f8900 |
| restr.exe | b5cacef347a785d9cabbf0385a3c2717 |
| Ring | 0c0195c48b6b8582fa6f6373032118da |
| vget.exe | 8eba146792a8a68c6e6992fee2071e23 |
| dskdgnostbat.key | 4ac6e2af5db82b97717c4f1ab45bd1c5 |
| dwdiag.cat | 6745b4829fa9f0195c730d849f6500ba |
| dwdiag32.cat | b9c240251c245f8e0ca7c1f54a6cdb5d |
| instll.bat | d3033eb75ff326cf03bcde41a75b3c7d |
| stp.bat | 79eb6c6f34ebc5c73fffea30cdcd7af2 |
| subinacl.exe | 53cdbb093b0aee9fd6cf1cbd25a95077 |
| zada4a.xml | 306d973bf0751c337e6239a58e35ff36 |
| zada4a_descr.xml | e0d29c37965bf8e40363113d02c3dd3d |
| hddsmart.bat | 31c029b19aa8b23223319e0f01a12545 |
| hddsvc.exe | f3ca8234f60eba24604b5a9390d2fed5 |
| ins.bat | ded0a61a14b906b69fd9dc5fc46110a2 |
| instsrv.exe | 7bc1928cd1d6ea2bce5fdb1fdeac0b3d |
| smarthdd.exe | 6eddcf70df22cd65b1cfa26de2513f32 |
| DskDiag32.exe ( 32 bit) | cbfdfcf530147abb18d9af84bb1736ae |
| DskDiag.exe ( 64 bit ) | 7c74c7e6f478e28453e085adf6c2b298 |
Share This Article

An Article By
An Article By
Security News
Security News