An overview: A team of TrendMicro observed fileless cryptocurrency-mining malware, GhostMiner on Aug 2. They found that the Ghostminer’s variant could modify infected host files that are heavily used by Mykings, PowerGhost, PCASTLE and BULEHERO, among others.
Earlier this year, Ghostminer came in limelight for weaponizing Windows Management Instrumentation (WMI) objects for its fileless persistence, payload mechanisms, and AV-evasion capabilities.
How it works: The team stumbled upon the malware when it was mining Monero cryptocurrency. Not much details (in writing) are out yet though.
Functions & Tasks (when the above command script is executed)
WMI_KillFake - Terminates processes and deletes corresponding files based on a list of conditions
WMI_KillService - Terminates services based on a set of conditions
WMI_Scanner - Terminates processes of known cryptominers in the process memory
WMI_CheckFile - Verifies the integrity of the file it drops
Additionally, the Command script also has WMI_Killer function, which terminates running processes, and deletes scheduled tasks and services that are associated with cryptocurrency-mining malware families such as Mykings, PowerGhost, PCASTLE, BULEHERO and other generic MALXMR variants used by several malware families, including BlackSquid.
Publisher