修改者: : Jay Bradley Nebre

 平台:

Windows

 总體(tǐ)风险等级:
 潜在破坏:
 潜在分(fēn)布:
 感染次数:
 信息暴露:

  • 恶意软件类型:
    Trojan

  • 有(yǒu)破坏性?:
    没有(yǒu)

  • 加密?:
     

  • In the Wild:
    是的

  概要

感染途徑: ???????, ?????????

它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。

  技(jì )术详细信息

文(wén)件大小(xiǎo): 19,645,440 bytes
报告日期: EXE
内存驻留: 是的
初始樣本接收日期: 2020年3月31日
Payload: ??? URL/Ip, ????, ??????
N

???????

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

??

???????:

  • %User Temp%\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "%User Temp%\CR_Debug_Log.txt" -o"%User Temp%\"
  • C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "%User Temp%\SystemCheck.xml" /TN "System\SystemCheck"

(??: %User Temp% ?????? Temp ???????? C:\Documents and Settings\{user name}\Local Settings\Temp (Windows 2000(32-bit)?XP ? Server 2003(32-bit))?C:\Users\{user name}\AppData\Local\Temp (Windows Vista?7?8?8.1?2008(64-bit)?2012(64-bit) ? 10(64-bit)?)

????

???????:

  • %User Temp%\asacpiex.dll -> archive file containing Coinminer.Win64.MOOZ.THCCABO
  • %User Temp%\CL_Debug_Log.txt -> 7-zip Archiver
  • %User Temp%\ZoomInstaller.exe -> normal Zoom Installer
  • %User Temp%\CR_Debug_Log.txt -> archive file containing Coinminer.Win64.MOOZ.THCCABO
  • %Application Data%\Microsoft\Windows\Helper.exe -> detected as Coinminer.Win64.MOOZ.THCCABO
  • %User Temp%\SystemCheck.xml

(??: %User Temp% ?????? Temp ???????? C:\Documents and Settings\{user name}\Local Settings\Temp (Windows 2000(32-bit)?XP ? Server 2003(32-bit))?C:\Users\{user name}\AppData\Local\Temp (Windows Vista?7?8?8.1?2008(64-bit)?2012(64-bit) ? 10(64-bit)?. %Application Data% ?????? Application Data ???,???? C:\Windows\Profiles\{user name}\Application Data (Windows 98 ? ME)?C:\WINNT\Profiles\{user name}\Application Data (Windows NT)?C:\Documents and Settings\{user name}\Local Settings\Application Data (Windows 2000(32-bit)?XP ? Server 2003(32-bit)) ? C:\Users\{user name}\AppData\Roaming (Windows Vista?7?8?8.1?2008(64-bit)?2012(64-bit) ? 10(64-bit))?)

????

???????:

  • System Information
  • OS Version
  • Video Controller
  • Processors
  • AV product
  • Smartscreen
  • Windows Defender

??????

?????????:

  • It sends the gathered information to the following URL:
    • https://{BLOCKED}o.co/1IRnc

  解决方案

最小(xiǎo)扫描引擎: 9.850
First VSAPI Pattern File: 15.776.04
VSAPI 第一样式发布日期: 2020年3月31日
VSAPI OPR样式版本: 15.777.00
VSAPI OPR样式发布日期: 2020年4月1日

Step 1

??Windows ME?XP??,????,????????????,??????????

Step 2

注意:在此恶意软件/间谍软件/灰色软件执行期间,并非所有(yǒu)文(wén)件、文(wén)件夹和注册表键值和项都会安(ān)装(zhuāng)到您的计算机上。这可(kě)能(néng)是由于不完整的安(ān)装(zhuāng)或其他(tā)操作(zuò)系统条件所致。如果您没有(yǒu)找到相同的文(wén)件/文(wén)件夹/注册表信息,请继续进行下一步操作(zuò)。

Step 3

??????????:

  1. ??“??”>“??”>“??”>“????”>“????”
  2. ???????
  3. ?????????????????“??:”???
  4. ???,?????????
  5. ?????????? 2-4 ??

Step 4

?????????????,???????Trojan.Win32.MOOZ.THCCABO?? ????????????????????????,????????????????????????????????????????