ASEC reports LoveMiner proxyware campaigns targeting poorly managed MS-SQL servers, combining proxyjacking and cryptomining operations. Attackers use multiple proxyware providers (Peer2Profit previously; now IP Royal Pawns, Traffmonetizer, Proxyrack, and PacketStream) and .NET Native AOT dropper variants to deploy malware. #LoveMiner #Peer2Profit #IPRoyalPawns #Traffmonetizer #Proxyrack #PacketStream #winupdate0.mdf
Keypoints
- Threat actors target publicly accessible MS-SQL servers with weak passwords via brute force or dictionary attacks to gain initial access.
- LoveMiner serves as both a downloader and loader, with the loader loading XMRig from a memory resource to perform cryptomining.
- Proxyjacking and cryptomining are conducted together, using proxyware from multiple providers (IPRoyal Pawns, Traffmonetizer, Proxyrack, PacketStream).
- New attacks show LoveMiner variants and a .NET Native AOT dropper (winupdate0.mdf) similar to prior LoveMiner components.
- The malware installs various proxyware tools (Traffmonetizer, IPRoyal Pawns, Proxyrack, PacketStream) via a dropper that uses warpstrat.dll as a launcher.
- Administrators are advised to strengthen MS-SQL passwords, apply patches, and limit external access to reduce risk.
MITRE Techniques
- [T1110] Brute Force β Used to gain access to poorly managed MS-SQL servers via brute force or dictionary attacks. β[target poorly managed MS-SQL servers and attempt to gain access through brute force or dictionary attacks.]β
- [T1496] Resource Hijacking β Proxyjacking involves unauthorized proxyware installation to share a portion of bandwidth for profit. β[Proxyjacking involves the unauthorized installation of proxyware on infected systems, which allows threat actors to share a portion of the systemβs Internet bandwidth with external sources for financial gain.]β
- [T1496] Resource Hijacking (Cryptomining) β Loader form loads XMRig to mine cryptocurrency using a memory-resident miner and a configured mining pool. β[β¦loader loads XMRig, which is stored in the internal resource βgmpβ, on the memory side. β¦ the string βgmpβ used in the resource name is still being used in recent attacks.]β
Indicators of Compromise
- [Domain] point-of-presence.sock[.]sh β used in campaign infrastructure
- [File name] winupdate0.mdf β proxyware dropper (new variant)
- [File name] sdk.mdf β proxyware dropper (older variant)
- [File name] warpstrat.dll β launcher tool used to execute proxyware
- [File name] sraffzer.exe β Traffmonetizer proxyware component
- [File name] settings.json β Traffmonetizer configuration
- [File name] sqlgo.exe β Proxyrack proxyware component
- [File name] prokey.obj β Proxyrack device_id store
- [File name] psexitnode.exe β PacketStream proxyware
- [File name] SQLSERVERHUP.dll β IPRoyal proxyware component
- [Credential] gmpgmp@duck[.]com β actor email used with IPRoyal Pawns
- [MD5] e8997e7d0cfee9875eb64b3aae8cc76a, ec336ebe46d1ed6b0381801d06fb30b4 (Proxyware Dropper and related components)
Read more: https://asec.ahnlab.com/en/56350/