![]() |
Monero stops you trying to check wallet balance |
An initial connection-check wants to take down unwanted software on the victim side (awk ‘{print $7}’ | sed -e “s/\/.*//g”) taking decisions upon specific IP addresses. It filters PID from connection states and it directly kills them (kill -9). The extracted attacker’s unwanted communications are the following ones:
- 103[.]99[.]115[.]220 (Org: HOST EDU (OPC) PRIVATE LIMITED, Country: IN)
- 104[.]160[.]171[.]94 (Org: Sharktech Country: USA)
- 121[.]18[.]238[.]56 (Org: ChinaUnicom, Country: CN)
- 170[.]178[.]178[.]57 (Org: Sharktech Country: USA)
- 27[.]155[.]87[.]59 (Org: CHINANET-FJ Country: CN)
- 52[.]15[.]62[.]13 (Org: Amazon Technologies Inc., Country: USA)
- 52[.]15[.]72[.]79 (Org: HOST EDU (OPC) PRIVATE LIMITED, Country: IN)
- 91[.]236[.]182[.]1 (Org: Brillant Auto Kft, Country: HU)
Following the analysis and extracting the configuration file from dropping URL we might observe the Monero wallet addresses and the Monero Pools used by attacker. The following wallets (W1, W2, W3) were found.
- W1: 4AB31XZu3bKeUWtwGQ43ZadTKCfCzq3wra6yNbKdsucpRfgofJP3YwqDiTutrufk8D17D7xw1zPGyMspv8Lqwwg36V5chYg
- W2: 4AB31XZu3bKeUWtwGQ43ZadTKCfCzq3wra6yNbKdsucpRfgofJP3YwqDiTutrufk8D17D7xw1zPGyMspv8Lqwwg36V5chYg
- W3: 4AB31XZu3bKeUWtwGQ43ZadTKCfCzq3wra6yNbKdsucpRfgofJP3YwqDiTutrufk8D17D7xw1zPGyMspv8Lqwwg36V5chYg
- 158[.]69[.]133[.]20 on port 3333
- 192[.]99[.]142[.]249 on port 3333
- 202[.]144[.]193[.]110 on port 3333
The downloaded payload is named sustes and it is a basic XMRIG, which is a well-known opensource miner. In this scenario it is used to make money at the expense of computer users by abusing the infected computer to mine Monero, a cryptocurrency. The following image shows the usage strings as an initial proof of software.
![]() |
XMRIG prove 1 |
Many people are currently wondering what is the sustes process which is draining a lot of PC resources (for example: here, here and here ) …. now we have an answer: it’s a unwanted Miner. :D.
Hope you had fun
- IP Address:
- 103[.]99[.]115[.]220 (Org: HOST EDU (OPC) PRIVATE LIMITED, Country: IN)
- 104[.]160[.]171[.]94 (Org: Sharktech Country: USA)
- 121[.]18[.]238[.]56 (Org: ChinaUnicom, Country: CN)
- 170[.]178[.]178[.]57 (Org: Sharktech Country: USA)
- 27[.]155[.]87[.]59 (Org: CHINANET-FJ Country: CN)
- 52[.]15[.]62[.]13 (Org: Amazon Technologies Inc., Country: USA)
- 52[.]15[.]72[.]79 (Org: HOST EDU (OPC) PRIVATE LIMITED, Country: IN)
- 91[.]236[.]182[.]1 (Org: Brillant Auto Kft, Country: HU)
- Custom Monero Pools:
- 158[.]69[.]133[.]20:3333
- 192[.]99[.]142[.]249:3333
- 202[.]144[.]193[.]110:3333
- Wallets:
- W1: 4AB31XZu3bKeUWtwGQ43ZadTKCfCzq3wra6yNbKdsucpRfgofJP3YwqDiTutrufk8D17D7xw1zPGyMspv8Lqwwg36V5chYg
- W2: 4AB31XZu3bKeUWtwGQ43ZadTKCfCzq3wra6yNbKdsucpRfgofJP3YwqDiTutrufk8D17D7xw1zPGyMspv8Lqwwg36V5chYg
- W3: 4AB31XZu3bKeUWtwGQ43ZadTKCfCzq3wra6yNbKdsucpRfgofJP3YwqDiTutrufk8D17D7xw1zPGyMspv8Lqwwg36V5chYg