2017-11-12 - "MERCURY TEXT" POPUP ON CHROME & FIREFOX PUSHES COINMINER

ASSOCIATED FILES:

  • 2017-11-12-Mercury-Text-pop-sends-coinminer.pcap   (2,835,555 bytes)
  • ttf.js   (11,150 bytes)
  • winhost.exe   (2,586,112 bytes)

 

NOTES:

 

IMAGES


Shown above:  Mercury Text popop on page from compromised site when using FireFox.

 


Shown above:  When using FireFox, this popup sends the JavaScript (.js) file directly.

 


Shown above:  Mercury Text popop on page from compromised site when using Chrome.

 


Shown above:  When using Chrome, this popup sends the JavaScript (.js) in a zip archive.

 


Shown above:  Script diplaying the Mercury Text popup isn't native to the site, but called from bmooc.net.

 


Shown above:  The bmooc.net URL was generated through a document.write, and this is the only JavaScript I found with a document.write.

 


Shown above:  Traffic from an infection filtered in Wireshark.

 


Shown above:  Post-infection traffic indicates this malware is the Monero (XMR) CPU miner.

 


Shown above:  What ttf.js looks like when extracted from the zip archive.

 


Shown above:  Monero CPU miner downloaded and run by the extracted .js file.

 


Shown above:  Scheduled task making the Monero CPU miner persistent on the infected host.

 

TRAFFIC

ASSOCIATED DOMAINS:

 

MALWARE

DOWNLOADED .JS FILE (USING FIREFOX BROWSER):

MONERO (XMR) CPU MINER:

 

FINAL NOTES

Once again, here are the associated files:

Zip and saz files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.