{"id":21657,"date":"2024-04-25T12:58:14","date_gmt":"2024-04-25T12:58:14","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=21657"},"modified":"2024-04-25T19:23:01","modified_gmt":"2024-04-25T19:23:01","slug":"guptiminer-escan-miners-backdoors","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/guptiminer-escan-miners-backdoors\/","title":{"rendered":"GuptiMiner Use eScan to Spread Miners and Backdoors"},"content":{"rendered":"<p>A recent report by Avast researchers identified an old-timer malware called GuptiMiner. It uses the eScan antivirus update mechanism to stealthily <strong>inject backdoors and cryptocurrency mining programs<\/strong> into users&#8217; computer systems and large corporate networks. This is further evidence that cybercriminals are adapting their techniques to bypass modern security measures. Let&#8217;s look at the situation.<\/p>\n<h2>Campaign discovery and GuptiMiner<\/h2>\n<p><a href=\"https:\/\/decoded.avast.io\/janrubin\/guptiminer-hijacking-antivirus-updates-for-distributing-backdoors-and-casual-mining\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Avast specialists analyzed the activity<\/a> of the GuptiMiner malware active since 2018. GuptiMiner is a sophisticated malware that aims at spreading backdoors and performing hidden cryptomining in corporate networks. The malware utilizes a multi-stage infection chain. It starts by hijacking antivirus software updates <a href=\"https:\/\/gridinsoft.com\/mitm\">through man-in-the-middle<\/a> (MitM) attacks. This allows attackers to substitute legitimate updates for malicious ones.<\/p>\n<p>Avast informed eScan and India CERT of <strong>the found vulnerability, which was successfully patched<\/strong> on July 31, 2023. However, since users rarely install more than one antivirus, this limits the ability to detect and analyze the full scope of GuptiMiner&#8217;s activities.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GS_BLOG_GuptiMiners-infection-chain_790x1108px-730x1024.webp\" alt=\"GuptiMiner\u2019s infection chain\" width=\"730\" height=\"1024\" class=\"aligncenter size-large wp-image-21693\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GS_BLOG_GuptiMiners-infection-chain_790x1108px-730x1024.webp 730w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GS_BLOG_GuptiMiners-infection-chain_790x1108px-214x300.webp 214w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GS_BLOG_GuptiMiners-infection-chain_790x1108px-768x1077.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GS_BLOG_GuptiMiners-infection-chain_790x1108px.webp 790w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/p>\n<p>This malware uses a complex infection chain. The attack starts by intercepting eScan antivirus updates. The update program is downloaded from the server, but in its path is an attacker who substitutes it with a malicious one. Next, eScan decompresses and downloads the package, initiating a chain of infection using a DLL. <strong>This DLL allows the virus to control further downloads<\/strong> and code execution.<\/p>\n<figure id=\"attachment_21675\" aria-describedby=\"caption-attachment-21675\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GuptiMiner-is-requesting-the-payload-1024x215.webp\" alt=\"GuptiMiner is requesting the payload\" width=\"750\" height=\"157\" class=\"size-large wp-image-21675\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GuptiMiner-is-requesting-the-payload-1024x215.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GuptiMiner-is-requesting-the-payload-300x63.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GuptiMiner-is-requesting-the-payload-768x161.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GuptiMiner-is-requesting-the-payload.webp 1249w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-21675\" class=\"wp-caption-text\">GuptiMiner is requesting the payload from a real IP address<\/figcaption><\/figure>\n<p>Next, GuptiMiner uses a sideloading technique to inject malicious code into trusted processes, which allows the program to remain invisible to antivirus systems. The malware also communicates with remote <a href=\"https:\/\/gridinsoft.com\/command-and-control\">command and control (C2) servers<\/a> to receive commands and updates. This allows attackers to control infected systems, run additional malicious processes, or conduct cryptocurrency mining.<\/p>\n<h2>How does GuptiMiner work?<\/h2>\n<p>GuptiMiner analysis revealed that the malware used a variety of sophisticated techniques to install and hide its presence on the system. Key techniques included sideloading DLL, modifying system files, and using forged digital signatures to simulate legitimacy.<\/p>\n<p>Also, one of the characteristic features of GuptiMiner is its ability to modularize infections. This includes <strong>performing DNS queries to the attacker&#8217;s DNS servers<\/strong> and extracting useful data from innocent-looking images. In addition to its core functionality of <a href=\"https:\/\/gridinsoft.com\/backdoor\">installing backdoors<\/a>, GuptiMiner unexpectedly spreads the XMRig miner used to mine the Monero cryptocurrency.<\/p>\n<p>The process of dynamically assigning mining threads for XMRig:<br \/>\n<code style=\"font-size: 12px\">xmrig_shellcode_copy_ = xmrig_shellcode_copy;<br \/>\nnum_cores_ = num_cores;<br \/>\ndword_140020908 = 25;<br \/>\nxmrig_shellcode_copy-\u203amax_cpu_usage = '53';<br \/>\nxmrig_shellcode_copy_->threads = '1';<br \/>\nif (num_cores_ >= 6)<br \/>\nxmrig_shellcode_copy_-\u203athreads = '2';<br \/>\nif ( num_cores_ >= 8 )<br \/>\nxmrig_shellcode_copy_->threads = '3';<\/code><\/p>\n<p>The malware has been identified as potentially linked to the Kimsuky, a prominent North Korean hacking group. This indicates possible state sponsorship and a high degree of organization of the attacks. Before, North Korean hackers showed a certain degree of <a href=\"https:\/\/gridinsoft.com\/cryptocurrency\">interest in acquiring cryptocurrency<\/a>. So, this should not be too much of a surprise.<\/p>\n<h3>Two Different types of Backdoors<\/h3>\n<p>While analyzing the GuptiMiner malware, researchers identified two <a href=\"https:\/\/gridinsoft.com\/backdoor\">different types of backdoors<\/a>. Both types of backdoors were designed to function as part of a large-scale and well-planned campaign. But each was designed to perform specific tasks on infected corporate networks.<\/p>\n<ul>\n<li>The first type of backdoor is a modified version of PuTTY Link, which is used to scan SMBs on the local network. This backdoor allows lateral movement (horizontal propagation of malware within the network) to <strong>access potentially vulnerable systems<\/strong> running Windows 7 and Windows Server 2008. This facilitates the exploitation of vulnerabilities in legacy operating systems.<\/li>\n<li>The second type of backdoor is multifunctional and modular. It accepts commands from the attacker to install additional modules and <strong>specializes in finding and stealing locally stored private keys<\/strong> and cryptocurrency wallets. This approach allows attackers to monitor infected systems for long periods of time and activate additional malicious features if necessary.<\/li>\n<\/ul>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env01.webp\" alt=\"GuptiMiner Use eScan to Spread Miners and Backdoors\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent report by Avast researchers identified an old-timer malware called GuptiMiner. It uses the eScan antivirus update mechanism to stealthily inject backdoors and cryptocurrency mining programs into users&#8217; computer systems and large corporate networks. This is further evidence that cybercriminals are adapting their techniques to bypass modern security measures. Let&#8217;s look at the situation. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":21662,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[625,23,619],"class_list":{"0":"post-21657","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-backdoor","9":"tag-coin-miner","10":"tag-cybersecurity"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/Banner-GuptiMiner_.png","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/21657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=21657"}],"version-history":[{"count":13,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/21657\/revisions"}],"predecessor-version":[{"id":21695,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/21657\/revisions\/21695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/21662"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=21657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=21657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=21657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}