Главная
Study mode:
on
1
Intro
2
ryptomining malware is still a thing
3
Mining pools 101
4
We developed different strategies to identify Stratum servers
5
Let's hunt for interesting samples
6
Processing workflow (static analysis)
7
Here are some way to specify Stratum server
8
Dynamic analysis
9
Extracting Stratum configuration from PCAPS
10
Looking for stratum servers over the Internet
11
Search Engines for Connected Hosts
12
Keywords to identify stratum servers
13
Identifying Mining Pool Websites
14
Extracting config: JS config file + API call
15
Extracting config: parsing HTML
16
Extracting config: (Parsing HTML) + API Call
17
Stratum TCP Scanner
18
Collected data
19
Default ports?
20
Scanning Internet
21
Docker exploitations?
22
Killing the competition
23
Very persistent miner
Description:
Explore the world of cryptomining malware and mining pools in this NorthSec 2019 conference talk. Delve into strategies for identifying Stratum servers, hunting interesting samples, and conducting static and dynamic analysis. Learn various methods to specify Stratum servers, extract configurations from PCAPs, and search for connected hosts using specific keywords. Discover techniques for identifying mining pool websites, extracting configurations through JS files, HTML parsing, and API calls. Gain insights into Stratum TCP scanning, collected data analysis, and potential Docker exploitations. Understand the persistence of miners and the competitive nature of cryptomining malware.

Trick or Treat - Unveil the "Stratum" of the Mining Pools

NorthSec
Add to list
0:00 / 0:00