MSH.Gosopad

Printer Friendly Page

Discovered: March 26, 2018
Updated: March 27, 2018 9:13:43 AM
Infection Length: Varies
Systems Affected: Windows
CVE References: CVE-2017-10271

MSH.Gosopad is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files and install a Monero miner.

Antivirus Protection Dates

  • Initial Rapid Release version March 26, 2018 revision 039
  • Latest Rapid Release version April 03, 2018 revision 021
  • Initial Daily Certified version March 27, 2018 revision 002
  • Latest Daily Certified version April 03, 2018 revision 035
  • Initial Weekly Certified release date March 28, 2018

Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Writeup By: John Stackpole

Discovered: March 26, 2018
Updated: March 27, 2018 9:13:43 AM
Infection Length: Varies
Systems Affected: Windows
CVE References: CVE-2017-10271

The threat may spread to compromised computers via the Oracle WebLogic Server Remote Security Vulnerability (CVE-2017-10271). It may also spread when attackers scan for servers running MSSQL and attempt to guess passwords, or scan for servers running PHPMyAdmin and attempt to guess passwords.

When the Trojan is executed, it creates the following registry entries:

  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\"MaxUserPort" = "65534"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\"TcpFinWait2Delay" = "30"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\"TcpTimedWaitDelay" = "30"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\"MaxFreeTcbs" = "16000"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\"MaxHashTableSize" = "10000"
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\"TcpNumConnections" = "0xFFFFFE"

The Trojan executes a PowerShell command and executes a script it reads from the following remote location:
  • http://123.[REMOVED].68.172/Cache/DL.php

The Trojan may create the following file:
  • %CurrentFolder%\ScreenShot.png

The Trojan creates the following Windows Management Instrumentation (WMI) class:
  • root\default:PowerShell_Command

The said class has the following properties:
  • EnCommand - holds a script that executes the miner
  • minerPId - process ID of the running miner
  • M - base64-encoded Monero miner
  • F - additional PowerShell functions

The Trojan creates the following WMI EventFilter:
  • PowerShell Event Log Filter

that is triggered every hour, which is bound to a WMI CommandLineEventConsumer named "PowerShell Event Log Consumer" that executes the Monero miner in a Powershell.exe process.

Next, the Trojan connects to the following command and control (C&C) server:
  • http://123.[REMOVED].68.172/Cache/Tunnel.php

The Trojan then collects the following information from the compromised computer and sends it to the C&C server:
  • Total physical memory
  • Available physical memory
  • Number of processors
  • Processor clock speed
  • Windows version
  • CPU architecture
  • Username
  • Computer name
  • Serial number of the C: drive

The Trojan may then perform the following actions:
  • Sleep
  • End the process
  • Execute a command
  • Take a screenshot
  • Spread to other computers

The Trojan's mining component ends other mining-related processes, such as:

Services named:
  • xWinWpdSrv
  • SVSHost
  • Microsoft Telemetry
  • lsass
  • Microsoft
  • system
  • Oracleupdate
  • CLR
  • sysmgt
  • \gm
  • WmdnPnSN
  • Natimmonal
  • Nationaloll
  • Nationaaal
  • Sougoudl

Tasks named:
  • Mysa
  • Mysa1
  • Mysa2
  • Mysa3
  • ok
  • Oracle Java
  • Oracle Java Update
  • Microsoft telemetry
  • Oracle Products Reporter
  • Update service for products
  • gm
  • ngm
  • Spooler SubSystem Service

Processes that contain the following words in their command lines:
  • cryptonight
  • stratum+
  • --donate-level
  • --max-cpu-usage
  • -p x
  • pool.electroneum.hashvault.pro

Processes with connections on the following ports:
  • 1111
  • 2222
  • 3333
  • 4444
  • 5555
  • 6666
  • 7777
  • 8888
  • 9999
  • 14433
  • 14444
  • 45560
  • 65333
  • 55335

Any process named:
  • msinfo
  • xmrig*
  • minerd
  • MinerGate
  • Carbon
  • yamm1
  • upgeade
  • auto-upgeade
  • svshost
  • SystemIIS
  • SystemIISSec
  • avast*
  • WindowsUpdater*
  • WindowsDefender*
  • update
  • service
  • csrsc
  • cara
  • javaupd
  • gxdrv
  • lsmosee
  • carss

The Trojan then spawns a new Powershell.exe process that installs the Monero miner.

Writeup By: John Stackpole

Discovered: March 26, 2018
Updated: March 27, 2018 9:13:43 AM
Infection Length: Varies
Systems Affected: Windows
CVE References: CVE-2017-10271

You may have arrived at this page either because you have been alerted by your Symantec product about this risk, or you are concerned that your computer has been affected by this risk.

Before proceeding further we recommend that you run a full system scan . If that does not resolve the problem you can try one of the options available below.



FOR NORTON USERS
If you are a Norton product user, we recommend you try the following resources to remove this risk.


Removal Tool


If you have an infected Windows system file, you may need to replace it using the Windows installation CD .


How to reduce the risk of infection
The following resources provide further information and best practices to help reduce the risk of infection.



FOR BUSINESS USERS
If you are a Symantec business product user, we recommend you try the following resources to remove this risk.


Identifying and submitting suspect files
Submitting suspicious files to Symantec allows us to ensure that our protection capabilities keep up with the ever-changing threat landscape. Submitted files are analyzed by Symantec Security Response and, where necessary, updated definitions are immediately distributed through LiveUpdate™ to all Symantec end points. This ensures that other computers nearby are protected from attack. The following resources may help in identifying suspicious files for submission to Symantec.


Removal Tool

If you have an infected Windows system file, you may need to replace it using the Windows installation CD .


How to reduce the risk of infection
The following resource provides further information and best practices to help reduce the risk of infection.
Protecting your business network



MANUAL REMOVAL
The following instructions pertain to all current Symantec antivirus products.


1. Performing a full system scan
How to run a full system scan using your Symantec product


2. Restoring settings in the registry
Many risks make modifications to the registry, which could impact the functionality or performance of the compromised computer. While many of these modifications can be restored through various Windows components, it may be necessary to edit the registry. See in the Technical Details of this writeup for information about which registry keys were created or modified. Delete registry subkeys and entries created by the risk and return all modified registry entries to their previous values.

Writeup By: John Stackpole