| Home - Virus Alerts|
It has been reported that a new cryptocurrency miner ransomware named as "Adylkuzz" is spreading exploiting Microsoft Server Message Block
(SMB) vulnerability (MS17-010). Adylkuzz also uses exploits ETERNALBLUE for exploiting the SMB vulnerability& install DOUBLEPULSAR
backdoor, the same exploits used by WannaCry ransomware. It propagates by scanning internet for machines with open TCP 445 port, if found
then it uses ETERNALBLUE exploit for initial exploitation and thereafter infect machines with DOUBLEPULSAR backdoor.
Adylkuzz: Cryptocurrency Mining Malware
Original Issue Date:May 19, 2017
Virus Type: Trojan
The malware is capable of performing the following functions:
Indicators of Compromise:
- It mines Monero, a cryptocurrency similar to Bitcoin
- It shuts down SMB networking to prevent further infections with other malware (including the WannaCry worm) by blocking TCP port 445
in windows Firewall
- It degrades PC and server performances
- It prevents access to shared Windows resources
- It make network connections to C2 server
and sends Public IP address, Malware version, operating system and architecture, CPU
frequency, Number of processors & Memory size information of infected machine
- It determines the public IP address of the victim, downloads Monero cryptocurrency miner and additional tools, and make DNS queries to
the Monero mining pool server.
- Downloads the mining instructions
File system changes:
List of SHA256 of Adylkuzz samples:
It is advised to block/monitor the connections to the above mentioned C2 domains.
Note: For complete list of indicators of compromise, kindly refer to the references section.
Specific Countermeasures to prevent Adylkuzz infection:
Users and administrators are advised to take the following preventive measures to protect their computer networks from ransomware
Establish a Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified
Mail (DKIM) for your domain, which is an email validation system designed to prevent spam by detecting email spoofing.
Don't open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained
in an unsolicited e-mail, even if the link seems benign. In cases of genuine URLs close out the e-mail and go to the organization's
website directly through browser
Restrict execution of PowerShell /WSCRIPT in enterprise environment Ensure installation and use of the latest version (currently v5.0)
of PowerShell, with enhanced logging enabled. Script block logging, and transcription enabled. Send the associated logs to a centralized
log repository for monitoring and analysis.
Application whitelisting/Strict implementation of Software Restriction Policies (SRP) to block binaries running from %APPDATA%,
%PROGRAMDATA% and %TEMP% paths. Malware sample drops and executes generally from these locations. Enforce application whitelisting on all
Deploy web and email filters on the network. Configure these devices to scan for known bad domains, sources, and addresses; block
these before receiving and downloading messages. Scan all emails, attachments, and downloads both on the host and at the mail gateway with
a reputable antivirus solution.
Disable macros in Microsoft Office products. Some Office products allow for the disabling of macros that originate from outside of an
organization and can provide a hybrid approach when the organization depends on the legitimate use of macros. For Windows, specific
settings can block macros originating from the Internet from running.
Configure access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs
to read specific files, they should not have write access to those files, directories, or shares.
Maintain updated Antivirus software on all systems
Consider installing Enhanced Mitigation Experience Toolkit, or similar host-level anti-exploitation tools.
Block the attachments of file types, exe|pif|tmp|url|vb|vbe|scr|reg|cer|pst|cmd|com|bat|dll|dat|hlp|hta|js|wsf
Keep the operating system third party applications (MS office, browsers, browser Plugins) up-to-date with the latest patches.
Follow safe practices when browsing the web. Ensure the web browsers are secured enough with appropriate content controls.
Network segmentation and segregation into security zones - help protect sensitive information and critical services. Separate
administrative network from business processes with physical controls and Virtual Local Area Networks.
Disable remote Desktop Connections, employ least-privileged accounts.
Ensure integrity of the codes /scripts being used in database, authentication and sensitive systems, Check regularly for the integrity
of the information stored in the databases.
Restrict users' abilities (permissions) to install and run unwanted software applications.
Enable personal firewalls on workstations.
Implement strict External Device (USB drive) usage policy.
Employ data-at-rest and data-in-transit encryption.
Carry out vulnerability Assessment and Penetration Testing (VAPT) and information security audit of critical networks/systems,
especially database servers from CERT-IN empaneled auditors. Repeat audits at regular intervals.
Individuals or organizations are not encouraged to pay the ransom, as this does not guarantee files will be released. Report such
instances of fraud to CERT-In and Law Enforcement agencies.
- Block SMB ports on Enterprise Edge/perimeter network devices [UDP 137, 138 and TCP 139, 445] or Disable SMBv1. SMB ports should
not be visible over public network.
- Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery
process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
The information provided herein is on "as is" basis, without warranty of any kind.
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
6, CGO Complex, Lodhi Road,
New Delhi - 110 003