Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. LoudMiner

LoudMiner

LoudMiner is a cryptocurrency miner which uses virtualization software to siphon system resources. The miner has been bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS.[1]

ID: S0451
Type: MALWARE
Platforms: macOS, Windows
Version: 1.4
Created: 18 May 2020
Last Modified: 11 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

LoudMiner used a batch script to run the Linux virtual machine as a service.[1]

.004Command and Scripting Interpreter:Unix Shell

LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

LoudMiner can automatically launch a Linux virtual machine as a service at startup if the AutoStart option is enabled in the VBoxVmService configuration file.[1]

.004Create or Modify System Process:Launch Daemon

LoudMiner adds plist files with the naming formatcom.[random_name].plist in the/Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set totrue.[1]

EnterpriseT1189Drive-by Compromise

LoudMiner is typically bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS.[1]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to "hidden".[1]

.006Hide Artifacts:Run Virtual Instance

LoudMiner has used QEMU and VirtualBox to run a Tiny Core Linux virtual machine, which runs XMRig and makes connections to the C2 server for updates.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

LoudMiner deleted installation files after completion.[1]

EnterpriseT1105Ingress Tool Transfer

LoudMiner used SCP to update the miner from the C2.[1]

EnterpriseT1027.010Obfuscated Files or Information:Command Obfuscation

LoudMiner has obfuscated various scripts.[1]

.013Obfuscated Files or Information:Encrypted/Encoded File

LoudMiner has encrypted DMG files.[1]

EnterpriseT1057Process Discovery

LoudMiner used theps command to monitor the running processes on the system.[1]

EnterpriseT1496.001Resource Hijacking:Compute Hijacking

LoudMiner harvested system resources to mine cryptocurrency, using XMRig to mine Monero.[1]

EnterpriseT1218.007System Binary Proxy Execution:Msiexec

LoudMiner used an MSI installer to install the virtualization software.[1]

EnterpriseT1082System Information Discovery

LoudMiner has monitored CPU usage.[1]

EnterpriseT1016System Network Configuration Discovery

LoudMiner used a script to gather the IP address of the infected machine before sending to the C2.[1]

EnterpriseT1569.001System Services:Launchctl

LoudMiner launched the QEMU services in the/Library/LaunchDaemons/ folder usinglaunchctl. It also useslaunchctl to unload allLaunch Daemons when updating to a newer version ofLoudMiner.[1]

.002System Services:Service Execution

LoudMiner started the cryptomining virtual machine as a service on the infected machine.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp