Lucifer

Lucifer is a crypto miner and DDoS hybrid malware that leverages well-known exploits to spread laterally on Windows platforms.[1]

ID: S0532
Type: MALWARE
Platforms: Windows
Contributors: Daniyal Naeem, BT Security
Version: 1.1
Created: 16 November 2020
Last Modified: 01 October 2021

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

Lucifer can use WMI to log into remote machines for propagation.[1]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire.[1]

Enterprise T1140 反混淆/解码文件或信息

Lucifer can decrypt its C2 address upon execution.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Lucifer can persist by setting Registry key values HKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

Lucifer can issue shell commands to download and execute additional payloads.[1]

Enterprise T1071 应用层协议

Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.[1]

Enterprise T1110 .001 暴力破解: Password Guessing

Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords.[1]

Enterprise T1012 查询注册表

Lucifer can check for existing stratum cryptomining information in HKLM\Software\Microsoft\Windows\CurrentVersion\spreadCpuXmr – %stratum info%.[1]

Enterprise T1570 横向工具传输

Lucifer can use certutil for propagation on Windows hosts within intranets.[1]

Enterprise T1027 .002 混淆文件或信息: Software Packing

Lucifer has used UPX packed binaries.[1]

Enterprise T1070 .001 移除指标: Clear Windows Event Logs

Lucifer can clear and remove event logs.[1]

Enterprise T1082 系统信息发现

Lucifer can collect the computer name, system architecture, default language, and processor frequency of a compromised host.[1]

Enterprise T1033 系统所有者/用户发现

Lucifer has the ability to identify the username on a compromised host.[1]

Enterprise T1049 系统网络连接发现

Lucifer can identify the IP and port numbers for all remote connections from the compromised host.[1]

Enterprise T1016 系统网络配置发现

Lucifer can collect the IP address of a compromised host.[1]

Enterprise T1498 网络拒绝服务

Lucifer can execute TCP, UDP, and HTTP denial of service (DoS) attacks.[1]

Enterprise T1046 网络服务发现

Lucifer can scan for open ports including TCP ports 135 and 1433.[1]

Enterprise T1497 .001 虚拟化/沙盒规避: System Checks

Lucifer can check for specific usernames, computer names, device drivers, DLL's, and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected.[1]

Enterprise T1496 .001 资源劫持: Compute Hijacking

Lucifer can use system resources to mine cryptocurrency, dropping XMRig to mine Monero.[1]

Enterprise T1105 输入工具传输

Lucifer can download and execute a replica of itself using certutil.[1]

Enterprise T1057 进程发现

Lucifer can identify the process that owns remote connections.[1]

Enterprise T1021 .002 远程服务: SMB/Windows Admin Shares

Lucifer can infect victims by brute forcing SMB.[1]

Enterprise T1210 远程服务漏洞利用

Lucifer can exploit multiple vulnerabilities including EternalBlue (CVE-2017-0144) and EternalRomance (CVE-2017-0144).[1]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

Lucifer has established persistence by creating the following scheduled task schtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F.[1]

References