Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Lucifer

Lucifer

Lucifer is a crypto miner and DDoS hybrid malware that leverages well-known exploits to spread laterally on Windows platforms.[1]

ID: S0532
Type: MALWARE
Platforms: Windows
Contributors: Daniyal Naeem, BT Security
Version: 1.1
Created: 16 November 2020
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071Application Layer Protocol

Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Lucifer can persist by setting Registry key valuesHKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic andHKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic.[1]

EnterpriseT1110.001Brute Force:Password Guessing

Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Lucifer can issue shell commands to download and execute additional payloads.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Lucifer can decrypt its C2 address upon execution.[1]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire.[1]

EnterpriseT1210Exploitation of Remote Services

Lucifer can exploit multiple vulnerabilities including EternalBlue (CVE-2017-0144) and EternalRomance (CVE-2017-0144).[1]

EnterpriseT1070.001Indicator Removal:Clear Windows Event Logs

Lucifer can clear and remove event logs.[1]

EnterpriseT1105Ingress Tool Transfer

Lucifer can download and execute a replica of itself usingcertutil.[1]

EnterpriseT1570Lateral Tool Transfer

Lucifer can usecertutil for propagation on Windows hosts within intranets.[1]

EnterpriseT1498Network Denial of Service

Lucifer can execute TCP, UDP, and HTTP denial of service (DoS) attacks.[1]

EnterpriseT1046Network Service Discovery

Lucifer can scan for open ports including TCP ports 135 and 1433.[1]

EnterpriseT1027.002Obfuscated Files or Information:Software Packing

Lucifer has used UPX packed binaries.[1]

EnterpriseT1057Process Discovery

Lucifer can identify the process that owns remote connections.[1]

EnterpriseT1012Query Registry

Lucifer can check for existing stratum cryptomining information inHKLM\Software\Microsoft\Windows\CurrentVersion\spreadCpuXmr – %stratum info%.[1]

EnterpriseT1021.002Remote Services:SMB/Windows Admin Shares

Lucifer can infect victims by brute forcing SMB.[1]

EnterpriseT1496.001Resource Hijacking:Compute Hijacking

Lucifer can use system resources to mine cryptocurrency, dropping XMRig to mine Monero.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Lucifer has established persistence by creating the following scheduled taskschtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F.[1]

EnterpriseT1082System Information Discovery

Lucifer can collect the computer name, system architecture, default language, and processor frequency of a compromised host.[1]

EnterpriseT1016System Network Configuration Discovery

Lucifer can collect the IP address of a compromised host.[1]

EnterpriseT1049System Network Connections Discovery

Lucifer can identify the IP and port numbers for all remote connections from the compromised host.[1]

EnterpriseT1033System Owner/User Discovery

Lucifer has the ability to identify the username on a compromised host.[1]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

Lucifer can check for specific usernames, computer names, device drivers, DLL's, and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected.[1]

EnterpriseT1047Windows Management Instrumentation

Lucifer can use WMI to log into remote machines for propagation.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp