{"id":12920,"date":"2018-07-26T14:10:05","date_gmt":"2018-07-26T22:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/07\/26\/news-6687\/"},"modified":"2018-07-26T14:10:05","modified_gmt":"2018-07-26T22:10:05","slug":"news-6687","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/07\/26\/news-6687\/","title":{"rendered":"&#8216;Hidden Bee&#8217; miner delivered via improved drive-by download toolkit"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 26 Jul 2018 21:00:22 +0000<\/strong><\/p>\n<p><em>This blog post was authored by\u00a0<a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener\">@hasherezade<\/a>\u00a0and\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/author\/jeromesegura\/\" target=\"_blank\" rel=\"noopener\">J\u00e9r\u00f4me Segura<\/a>.<\/em><\/p>\n<p>We recently detected a drive-by a download attempt trying to exploit <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/new-flash-player-zero-day-comes-inside-office-document\/\" target=\"_blank\" rel=\"noopener\">CVE-2018-4878<\/a>, a vulnerability in Flash Player, in a sequence that was not matching any of the exploit kit patterns that we currently track. Upon investigation, we discovered something that was new to us, but is part of an <a href=\"http:\/\/bobao.360.cn\/interref\/detail\/248.html\" target=\"_blank\" rel=\"noopener\">existing exploitation framework<\/a> discovered in late 2017 by Qihoo360. At the time, the payload\u00a0 appeared to be a Trojan pushing adware. (<em>Note: On July 26, our colleagues from\u00a0TrendMicro published a <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-underminer-exploit-kit-delivers-bootkit-and-cryptocurrency-mining-malware-with-encrypted-tcp-tunnel\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a> calling it the Underminer exploit kit<\/em>).<\/p>\n<p>Since it was last documented, there have been changes to the exploits being used, although the distribution method is similar. One interesting aspect that we don&#8217;t see much of these days is the use of encryption to package exploits on-the-fly, which requires a key from the backend server to decrypt and execute them.<\/p>\n<p>The payload served in this campaign is also out of the ordinary because it is not a standard PE file. Instead, it is a multiple-stage custom executable format, acting also as a downloader to retrieve LUA scripts used by the threat actors behind the\u00a0<a href=\"http:\/\/www.cnhongke.org\/article\/46057\" target=\"_blank\" rel=\"noopener\">Hidden Bee<\/a>\u00a0miner botnet. This was perhaps the first case of a bootkit being used to enslave machines mining cryptocurrencies.<\/p>\n<h3>Campaign overview<\/h3>\n<p>The attackers are leveraging malvertising via adult sites to redirect their victims to the exploit kit landing page. We believe this campaign is primarily targeting Asian countries based on the ads that are served and our own telemetry data. A server purporting to be an online dating service contains a malicious iframe responsible for the exploitation and infection phases.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24837\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/iframe-17\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/iframe.png\" data-orig-size=\"813,693\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"iframe\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/iframe-300x256.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/iframe-600x511.png\" class=\"size-full wp-image-24837 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/iframe.png\" alt=\"\" width=\"813\" height=\"693\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/iframe.png 813w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/iframe-300x256.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/iframe-600x511.png 600w\" sizes=\"auto, (max-width: 813px) 100vw, 813px\" \/><\/p>\n<h3>Traffic play-by-play<\/h3>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/traffic_sequence.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24848\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/traffic_sequence\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/traffic_sequence.png\" data-orig-size=\"666,425\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic_sequence\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/traffic_sequence-300x191.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/traffic_sequence-600x383.png\" class=\"size-full wp-image-24848 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/traffic_sequence.png\" alt=\"\" width=\"666\" height=\"425\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/traffic_sequence.png 666w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/traffic_sequence-300x191.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/traffic_sequence-600x383.png 600w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/a><\/p>\n<h4>IE exploit<\/h4>\n<p>With a few exceptions, exploit kits typically obfuscate their landing page and exploits. But here the threat actors go beyond by using encryption and requiring a key exchange with the backend server in order to decrypt and execute the exploit. In the past, <a href=\"https:\/\/securelist.com\/attacking-diffie-hellman-protocol-implementation-in-the-angler-exploit-kit\/72097\/\" target=\"_blank\" rel=\"noopener\">Angler<\/a>, <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/how-exploit-kit-operators-are-misusing-diffie-hellman-key-exchange\/\" target=\"_blank\" rel=\"noopener\">Nuclear<\/a> and <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/astrum-exploit-kit-abuses-diffie-hellman-key-exchange\/\" target=\"_blank\" rel=\"noopener\">Astrum<\/a> exploit kits have abused the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Diffie%E2%80%93Hellman_key_exchange\" target=\"_blank\" rel=\"noopener\">Diffie-Hellman<\/a> key exchange protocol in similar ways to prevents analysts from replaying malicious traffic.<\/p>\n<p>The execution of the malicious code starts from a webpage with an embedded encrypted block. This block is Base64 encoded and encrypted with one of two algorithms: <a href=\"https:\/\/en.wikipedia.org\/wiki\/RC4\" target=\"_blank\" rel=\"noopener\">RC4<\/a> or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Rabbit_(cipher)\" target=\"_blank\" rel=\"noopener\">Rabbit<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/base64_rabbit.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24899\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/base64_rabbit\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/base64_rabbit.png\" data-orig-size=\"675,641\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"base64_rabbit\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/base64_rabbit-300x285.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/base64_rabbit-600x570.png\" class=\"size-full wp-image-24899 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/base64_rabbit.png\" alt=\"\" width=\"675\" height=\"641\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/base64_rabbit.png 675w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/base64_rabbit-300x285.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/base64_rabbit-600x570.png 600w\" sizes=\"auto, (max-width: 675px) 100vw, 675px\" \/><\/a><\/p>\n<p>After being decrypted, the block is executed. You can find the decoded version of the Java Script that is being run <a href=\"https:\/\/pastebin.com\/h7J8geXF\" target=\"_blank\" rel=\"noopener\">here<\/a>. As you can see in the script, it generates a random session key, then encrypts it with the attacker&#8217;s public RSA key:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24900\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/key-5\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key.png\" data-orig-size=\"671,147\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"key\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key-300x66.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key-600x131.png\" class=\"size-full wp-image-24900 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key.png\" alt=\"\" width=\"671\" height=\"147\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key.png 671w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key-300x66.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key-600x131.png 600w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/a><\/p>\n<p>The encrypted key is being passed onto the next function and converted into JSON format to perform a POST request to the hardcoded URL:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/POST.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24901\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/post-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/POST.png\" data-orig-size=\"644,230\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"POST\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/POST-300x107.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/POST-600x214.png\" class=\"size-full wp-image-24901 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/POST.png\" alt=\"\" width=\"644\" height=\"230\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/POST.png 644w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/POST-300x107.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/POST-600x214.png 600w\" sizes=\"auto, (max-width: 644px) 100vw, 644px\" \/><\/a><\/p>\n<p>This is what we can see if we look at the traffic between the client and the server (the client sends the encrypted &#8220;key&#8221; and the server responds with the &#8220;value&#8221;):<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key_value.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24852\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/key_value\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key_value.png\" data-orig-size=\"684,586\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"key_value\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key_value-300x257.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key_value-600x514.png\" class=\"size-full wp-image-24852 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key_value.png\" alt=\"\" width=\"684\" height=\"586\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key_value.png 684w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key_value-300x257.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/key_value-600x514.png 600w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/a><\/p>\n<p><strong>Server-side<\/strong><\/p>\n<ul>\n<li>With the attackers&#8217; private RSA key, the server decrypts the passed session key.<\/li>\n<li>It uses it to encrypt the exploit content with a chosen symmetric algorithm (Rabbit or RC4).<\/li>\n<li>It returns the encrypted content back to the client.<\/li>\n<\/ul>\n<p>Thanks to the fact that the client still has an unencrypted version of the key in memory, it is able to decrypt and execute the exploit. However, researchers who just have the traffic captured cannot retrieve the original session key, and replaying the exploit is impossible. Thankfully, we managed to capture the exploit during dynamic analysis.<\/p>\n<p>The decrypted exploit, which we believe is <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/\" target=\"_blank\" rel=\"noopener\">CVE-2018-8174<\/a>\u00a0(our test machine was patched against CVE-2016-0189), is shown below:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/decrypted_IE.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24885\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/decrypted_ie\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/decrypted_IE.png\" data-orig-size=\"698,786\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"decrypted_IE\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/decrypted_IE-266x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/decrypted_IE-533x600.png\" class=\"size-full wp-image-24885 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/decrypted_IE.png\" alt=\"\" width=\"698\" height=\"786\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/decrypted_IE.png 698w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/decrypted_IE-266x300.png 266w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/decrypted_IE-533x600.png 533w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\" \/><\/a><\/p>\n<h4>Flash exploit<\/h4>\n<p>This newer Flash exploit (<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/new-flash-player-zero-day-comes-inside-office-document\/\" target=\"_blank\" rel=\"noopener\">CVE-2018-4878<\/a>) was not part of the exploit toolkit at the time Qihoo documented it, and seems to be a more recent addition to boost its capabilities. The shellcode embedded in the exploit is a downloader for the next stage.<\/p>\n<p>Upon successful exploitation, it will retrieve its payload at the following URL:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SWF_exploit_.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24886\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/swf_exploit_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SWF_exploit_.png\" data-orig-size=\"911,654\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SWF_exploit_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SWF_exploit_-300x215.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SWF_exploit_-600x431.png\" class=\"size-full wp-image-24886 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SWF_exploit_.png\" alt=\"\" width=\"911\" height=\"654\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SWF_exploit_.png 911w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SWF_exploit_-300x215.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SWF_exploit_-600x431.png 600w\" sizes=\"auto, (max-width: 911px) 100vw, 911px\" \/><\/a>This file, given the extension .wasm, pretends to be a Web Assembler module. But in fact, it is something entirely different, appearing to be a custom executable format, or a modified, header-less PE file.<\/p>\n<p>It starts from the names of the DLLs that are going to be needed during the execution:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dlls_.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24909\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/dlls_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dlls_.png\" data-orig-size=\"625,181\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"dlls_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dlls_-300x87.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dlls_-600x174.png\" class=\"size-full wp-image-24909 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dlls_.png\" alt=\"\" width=\"625\" height=\"181\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dlls_.png 625w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dlls_-300x87.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dlls_-600x174.png 600w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/a><\/p>\n<p>As you can see, it loads Cabinet.dll that is used for unpacking cabinet files. In later sections, we saw the APIs and strings that are used for the communication over HTTP protocol. We also found references to &#8220;dllhost.exe&#8221; and &#8220;bin\/i386\/core.sdb&#8221;.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/next_part_.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24910\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/next_part_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/next_part_.png\" data-orig-size=\"620,464\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"next_part_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/next_part_-300x225.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/next_part_-600x449.png\" class=\"size-full wp-image-24910 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/next_part_.png\" alt=\"\" width=\"620\" height=\"464\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/next_part_.png 620w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/next_part_-300x225.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/next_part_-600x449.png 600w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<p>It is easy to guess that this module will be downloading something and running via dllhost.exe.<\/p>\n<p>Another interesting string is a Base64-encoded content:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/data_part_.png\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24913\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/data_part_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/data_part_.png\" data-orig-size=\"621,283\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"data_part_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/data_part_-300x137.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/data_part_-600x273.png\" class=\"size-full wp-image-24913 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/data_part_.png\" alt=\"\" width=\"621\" height=\"283\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/data_part_.png 621w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/data_part_-300x137.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/data_part_-600x273.png 600w\" sizes=\"auto, (max-width: 621px) 100vw, 621px\" \/><\/a><\/p>\n<p>The decoded content points to more URLs:<\/p>\n<pre>http:\/\/103.35.72.223\/git\/wiki.asp?id=530475f52527a9ae1813d529653e9501  http:\/\/103.35.72.223\/git\/glfw.wasm  http:\/\/103.35.72.223\/rt\/lsv3i06rrmcu491c3tv82uf228.wasm  <\/pre>\n<p>Looking at the traffic captured by Fiddler, we found that, indeed, those URLs are being queried:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_.png\" data-rel=\"lightbox-10\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24914\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/queried_urls_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_.png\" data-orig-size=\"780,58\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"queried_urls_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_-300x22.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_-600x45.png\" class=\"size-full wp-image-24914 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_.png\" alt=\"\" width=\"780\" height=\"58\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_.png 780w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_-300x22.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_-600x45.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/queried_urls_-767x58.png 767w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/a><\/p>\n<p>The requests are coming from dllhost.exe, so that means the above executable was injected there.<\/p>\n<p>The file <em>glfw.wasm<\/em>\u00a0has nothing in common with Web Assembly. It is, in fact, a Cabinet file, containing packed content under the internal path: bin\/i386\/core.sdb. Looking inside, we found the same custom executable format, starting from DLL names:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/coresdb_.png\" data-rel=\"lightbox-11\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24915\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/coresdb_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/coresdb_.png\" data-orig-size=\"623,183\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"coresdb_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/coresdb_-300x88.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/coresdb_-600x176.png\" class=\"size-full wp-image-24915 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/coresdb_.png\" alt=\"\" width=\"623\" height=\"183\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/coresdb_.png 623w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/coresdb_-300x88.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/coresdb_-600x176.png 600w\" sizes=\"auto, (max-width: 623px) 100vw, 623px\" \/><\/a><\/p>\n<p>Then, HTTP traffic stops. This was another interesting aspect of this threa,t because the threat actors are perhaps trying to hide the traffic by pretending to use the SLTP protocol to retrieve the actual payload, which can be seen in the strings extracted from the Cabinet file inside of <em>core.sdb<\/em>:<\/p>\n<pre>INSTALL_SOURCE  &amp;sid=%u  INSTALL_SID  INSTALL_CID  <strong>sltp:\/\/setup.gohub[.]online:1108\/setup.bin?id=128<\/strong>  ntdll.dll  ZwQueryInformationProcess  VolumeNumber  SCSIDISK  os=%d&amp;ar=%d  kernel32.dll  IsWow64Process  RtlGetNtVersionNumbers  %02x  &amp;sz=  sltp<\/pre>\n<p>That hostname resolves to\u00a067.198.208[.]110:<\/p>\n<pre>Pinging setup.gohub.online [67.198.208.110] with 32 bytes of data:  Reply from 67.198.208.110: bytes=32 time=76ms TTL=51<\/pre>\n<p>Encrypted TCP network traffic from our sandboxed machine shows how the binary payload is retrieved:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/encrypted_traffic.png\" data-rel=\"lightbox-12\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24892\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/encrypted_traffic-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/encrypted_traffic.png\" data-orig-size=\"757,663\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"encrypted_traffic\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/encrypted_traffic-300x263.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/encrypted_traffic-600x525.png\" class=\"size-full wp-image-24892 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/encrypted_traffic.png\" alt=\"\" width=\"757\" height=\"663\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/encrypted_traffic.png 757w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/encrypted_traffic-300x263.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/encrypted_traffic-600x525.png 600w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/a><\/p>\n<p>This whole exploitation and payload retrieval process is rather complex, especially in light of the intended purpose behind this drive-by campaign. Infected hosts are instructed to mine for cryptocurrencies:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/mining_activity.png\" data-rel=\"lightbox-13\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24888\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/mining_activity\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/mining_activity.png\" data-orig-size=\"608,332\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"mining_activity\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/mining_activity-300x164.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/mining_activity-600x328.png\" class=\"size-full wp-image-24888 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/mining_activity.png\" alt=\"\" width=\"608\" height=\"332\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/mining_activity.png 608w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/mining_activity-300x164.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/mining_activity-600x328.png 600w\" sizes=\"auto, (max-width: 608px) 100vw, 608px\" \/><\/a><\/p>\n<p>What is unique about this miner is that it achieves persistence by using a bootkit, as described <a href=\"http:\/\/www.cnhongke.org\/article\/46057\" target=\"_blank\" rel=\"noopener\">here<\/a>. Infected hosts will have their Master Boot Record altered to start the miner every time the operating system boots.<\/p>\n<h3>A sophisticated attack for a simple payload<\/h3>\n<p>This attack is interesting on many levels for its use of different technologies both in the exploit delivery part as well as how the payload is packaged. According to our telemetry, we believe it is also focused on a select few Asian countries, which makes sense when taking its payload into consideration.<\/p>\n<p>It also shows that threat actors haven&#8217;t completely given up on exploit kits, despite a noted downward trend over the last couple of years.<\/p>\n<h3>Protection<\/h3>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> detects both the IE and Flash exploits, resulting in the infection chain being stopped early on.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/exploit_block.gif\" data-rel=\"lightbox-14\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24902\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/attachment\/exploit_block\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/exploit_block.gif\" data-orig-size=\"769,676\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"exploit_block\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/exploit_block-300x264.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/exploit_block-600x527.gif\" class=\"size-full wp-image-24902 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/exploit_block.gif\" alt=\"\" width=\"769\" height=\"676\" \/><\/a><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Injected dating site<\/p>\n<pre>144.202.87[.]106<\/pre>\n<p>Exploit toolkit<\/p>\n<pre>103.35.72[.]223<\/pre>\n<p>52he3kf2g2rr6l5s1as2u0198k.wasm<\/p>\n<pre>087FD1F1932CDC1949B6BBBD56C7689636DD47043C2F0B6002C9AFB979D0C1DD<\/pre>\n<p>glfw.wasm<\/p>\n<pre>CCD77AC6FE0C49B4F71552274764CCDDCBA9994DF33CC1240174BCAB11B52313<\/pre>\n<p>Payload URL and IP<\/p>\n<pre>setup.gohub[.]online:1108\/setup.bin?id=128  67.198.208[.]110<\/pre>\n<p>Miner Proxy<\/p>\n<pre>133.130.101[.]254<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/\">&#8216;Hidden Bee&#8217; miner delivered via improved drive-by download toolkit<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 26 Jul 2018 21:00:22 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/' title=''Hidden Bee' miner delivered via improved drive-by download toolkit'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/shutterstock_762053431.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bootkit\/\" rel=\"tag\">bootkit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptominer\/\" rel=\"tag\">cryptominer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/drive-by-attack\/\" rel=\"tag\">drive-by attack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit\/\" rel=\"tag\">exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hidden-bee\/\" rel=\"tag\">hidden bee<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hidden-bee-miner\/\" rel=\"tag\">hidden bee miner<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mbr\/\" rel=\"tag\">MBR<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/' title=''Hidden Bee' miner delivered via improved drive-by download toolkit'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit\/\">&#8216;Hidden Bee&#8217; miner delivered via improved drive-by download toolkit<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[19069,15079,17617,11638,10987,19070,19071,19072,10494],"class_list":["post-12920","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bootkit","tag-cryptominer","tag-drive-by-attack","tag-exploit","tag-exploits","tag-hidden-bee","tag-hidden-bee-miner","tag-mbr","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12920"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12920\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12920"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}