Skip to content

Hide Navigation Hide TOC

Edit

Cryptominers

A list of cryptominer and cryptojacker malware.

Authors
Authors and/or Contributors
Cisco Talos
raw-data

Lemon Duck

The infection starts with a PowerShell loading script, which is copied from other infected systems via SMB, email or external USB drives. The actor also employs several exploits for vulnerabilities such as SMBGhost and Eternal Blue.

Internal MISP references

UUID fa9cbe22-0ef7-4fbd-8a33-ce395eaa6df9 which can be used as unique global reference for Lemon Duck in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
type ['cryptojacker']

WannaMine

WannaMine is a cryptojacker that takes advantage of EternalBlue.

Internal MISP references

UUID 20e563b0-f0c9-4253-aedd-a4542d6689ed which can be used as unique global reference for WannaMine in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
type ['cryptojacker']

Blue Mockingbird Cryptominer

Blue Mockingbird Crypto miner is a crypto-mining payload within DLLs on Windows Systems.

Internal MISP references

UUID 3dd091c9-608f-44d6-ac0c-5dfdf9bb4518 which can be used as unique global reference for Blue Mockingbird Cryptominer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value

Krane

The Krane malware uses SSH brute-force techniques to drop the XMRig cryptominer on the target to mine for the Hashvault pool.

Internal MISP references

UUID a0c0ab05-c390-425c-9311-f64bf7ca9145 which can be used as unique global reference for Krane in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value

Hezb

“Hezb”, which is based on command line artifact data, was observed around Kinsing. This malware is relatively new and was recently reported in late May exploiting WSO2 RCE (CVE-2022-29464) in the wild. Several malware components were observed, the first of which was an XMRig miner installed as “Hezb”. Additional modules included a polkit exploit for privilege escalation as well as a zero-detection ELF payload named “kik”.

Internal MISP references

UUID 428bbf01-7756-48a2-848d-6bca3997f1df which can be used as unique global reference for Hezb in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value