2017-11-12 - "MERCURY TEXT" POPUP ON CHROME & FIREFOX PUSHES MONERO CRYPTOCURRENCY MINER

NOTICE:

ASSOCIATED FILES:

  • 2017-11-12-Mercury-Text-popup-sends-Monero-coinminer.pcap   (2,835,555 bytes)
  • ttf.js   (11,150 bytes)
  • winhost.exe   (2,586,112 bytes)

 

NOTES:

 

IMAGES


Shown above:  Mercury Text popup on page from compromised site when using FireFox.

 


Shown above:  When using FireFox, this popup sends the JavaScript (.js) file directly.

 


Shown above:  Mercury Text popup on page from compromised site when using Chrome.

 


Shown above:  When using Chrome, this popup sends the JavaScript (.js) in a zip archive.

 


Shown above:  Script displaying the Mercury Text popup isn't native to the site, but called from bmooc[.]net.

 


Shown above:  The bmooc[.]net URL was generated through a document.write, and this is the only JavaScript I found with a document.write.

 


Shown above:  Traffic from an infection filtered in Wireshark.

 


Shown above:  Post-infection traffic indicates this malware is the Monero (XMR) CPU miner.

 


Shown above:  What ttf.js looks like when extracted from the zip archive.

 


Shown above:  Monero coin miner downloaded and run by the extracted .js file.

 


Shown above:  Scheduled task making the Monero coin miner persistent on the infected host.

 

TRAFFIC

ASSOCIATED DOMAINS:

 

MALWARE

DOWNLOADED .JS FILE (USING FIREFOX BROWSER):

MONERO (XMR) COIN MINER:

 

Click here to return to the main page.