DarthMiner Mining Malware
DarthMiner is a newly observed cryptocurrency mining malware created using the open-source EmPyre post-exploitation tool and the XMRig mining application.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
DarthMiner is a newly observed cryptocurrency mining malware created using the open-source EmPyre post-exploitation tool and the XMRig mining application.
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication, it is unclear how DarthMiner is distributed, although it appears to disguised as the Adobe Zii anti-piracy application. When opened, a shell script is executed to download and run a separate Python script. The Python script will then check for the presence of the Little Snitch application firewall, terminating itself if this is the case, before initiating a connection to it's EmPyre-enabled command and control (C2) infrastructure. A launch agent is then downloaded from a C2 server to maintain persistence.
Once it has gained access to an affected device, DarthMiner will download and install XMRig. It is also has the ability to install root certificates for the mitmproxy traffic interception software, although it does not appear to be used at this time.
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect an infection, ensure that:
|
Last edited: 17 February 2020 1:00 pm