Analysis of CoinMiner Attacks Targeting Web Servers

June 24, 2024, 8:56 a.m.

Description

The report details two separate attack cases targeting a Korean medical institution's web server, resulting in the installation of CoinMiners. The targeted server was a Windows IIS server, likely with PACS software installed. In both attacks, web shells were uploaded, and system information was collected. The first attack involved the use of Chinese tools like Cpolar and installation of a CoinMiner. The second attack used different tools like EarthWorm and RingQ but had the same ultimate goal of installing a CoinMiner. Based on various indicators, the threat actors in both cases are suspected to be Chinese-speaking users.

Date

  • Created: June 24, 2024, 8:16 a.m.
  • Published: June 24, 2024, 8:16 a.m.
  • Modified: June 24, 2024, 8:56 a.m.

Indicators

  • e95e59984abcb80ba96b6379f31614995d0c462acd83a2180fead7ff11660eff
  • ef91f4c5e4149f88c02ced681dd277593fc69edbcded8b506c3a2d601afda309
  • e8fbec25db4f9d95b5e8f41cca51a4b32be8674a4dea7a45b6f7aeb22dbc38db
  • c3887213c1fb6721c8fe231fc65e62f1dbf7b2a4e3038900fce64807b66b4820
  • c257ba5d2283a288115e026af12b369b38488737408e1e771794ad6e35b6412b
  • 9f62c1d330dddad347a207a6a565ae07192377f622fa7d74af80705d800c6096
  • 9a8e9d587b570d4074f1c8317b163aa8d0c566efd88f294d9d85bc7776352a28
  • 95b115038debcff42c6fe6cf1a89e4072b3e03f360ef62460cffcf7f5f4bdda7
  • 78eed41cec221edd4ffed223f2fd2271a96224fd1173ed685c8c0b274fe93029
  • 4ff8820d088b32f5ade6c9bb7d88f0291e08267c70235297c28c448bd42b9ab7
  • 4e1469c61a6017c38d840c4751abfdd21fd98a0ff2d5fdba26d227cd448b5f64
  • 3a6091fd5b5755d0249ef4d6af11c807dbe902c2428f923ad2490e99ebbf06ad
  • 3e59379f585ebf0becb6b4e06d0fbbf806de28a4bb256e837b4555f1b4245571
  • 38440cb4263ab8e89751ddaee65912b1ae9604cffda0d6955191e4e669a57c96
  • 3027a212272957298bf4d32505370fa63fb162d6a6a6ec091af9d7626317a858
  • 2e8c7eacd739ca3f3dc4112b41a024157035096b8d0c26ba79d8b893136391bc
  • 24d373bab944de6f019e4c4744e56ed8b2f8803a82fb54bbf0882e11a95483c7
  • 1cd966f10763befded887621ae3a4bf8fdb8f64de06c60e65d69fae19a8aece6
  • 1bc740dcaaf0e2b07609d7f8e1a8823550fe93bba7503c899e5e5503f881bfdb
  • 16c82388c73f744d12813a016539c46edeeea379020d158fb2afbc578d28fb31
  • f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd
  • 45.147.51.78
  • 192.210.206.76
  • 141.11.89.42
  • 14.19.214.36
  • 1.119.3.28
  • 45.130.22.219
  • http://smtp.wptask.cyou:465
  • http://sky.wptask.cyou:9999
  • http://sinmaxinter.top:7005
  • http://sinmaxinter.top:7001/C3-server25.zip:
  • http://sinmaxinter.top:7001/services.zip:
  • http://pop3.wptask.cyou:995
  • http://info.perflogs.top:995
  • http://c3.wptask.cyou:33333
  • http://auto.skypool.xyz:9999
  • http://auto.c3pool.org:33333
  • http://45.147.51.78:995
  • http://45.147.51.78:465
  • http://45.130.22.219:995
  • http://45.130.22.219:465
  • http://45.130.22.219/aspx.exe:
  • http://192.210.206.76/sRDI.dat:
  • http://141.11.89.42:995
  • http://141.11.89.42:8443
  • http://141.11.89.42:465
  • http://14.19.214.36/fscan.exe:
  • http://14.19.214.36:6666/pp.exe:
  • http://14.19.214.36/ew.exe:
  • http://14.19.214.36/aa.aspx:
  • http://14.19.214.36/RingQ.exe:
  • http://14.19.214.36/11.exe:
  • smtp.wptask.cyou
  • sky.wptask.cyou
  • pop3.wptask.cyou
  • info.perflogs.top
  • c3.wptask.cyou
  • auto.skypool.xyz
  • sinmaxinter.top

Attack Patterns

  • PrintNotifyPotato
  • NetCat
  • Fscan
  • EarthWorm
  • Lcx
  • Frpc
  • Cpolar
  • Ladon
  • GodPotato
  • BadPotato
  • RingQ
  • XMRig
  • T1543.003
  • T1135
  • T1053.005
  • T1136
  • T1059.001
  • T1087
  • T1070
  • T1106
  • T1082
  • T1071
  • T1543
  • T1055
  • T1569
  • T1027
  • T1053
  • T1562
  • T1190
  • T1072
  • T1059
  • CVE-2021-1732