This one hit a weblogic honeypot.
Wallet ID: 43ZSpXdMerQGerimDrUviDN6qP3vkwnkZY1vvzTV22AbLW1oCCBDstNjXqrT3anyZ22j7DEE74GkbVcQFyH2nNiC3fchGfc
Uses minexmr.com and supportxmr.com
#Update
$WmiName = 'root\cimv2:PowerShell_Command'
### Keybase proof | |
I hereby claim: | |
* I am nma-io on github. | |
* I am nma_io (https://keybase.io/nma_io) on keybase. | |
* I have a public key ASB5e6gJqexrjBxhz6XjWxjilUicAEpypPaWsY_RFu7ZhQo | |
To claim this, I am signing this object: |
This one hit a weblogic honeypot.
Wallet ID: 43ZSpXdMerQGerimDrUviDN6qP3vkwnkZY1vvzTV22AbLW1oCCBDstNjXqrT3anyZ22j7DEE74GkbVcQFyH2nNiC3fchGfc
Uses minexmr.com and supportxmr.com
#Update
$WmiName = 'root\cimv2:PowerShell_Command'
$counters = (Get-Counter '\Process(*)\% Processor Time').CounterSamples | |
$malwares = "Kilence","alm","vag_pag","office","pws_lotinfo_trans","aspnet_state","tasksvr","ekrn","iems","secscan","mysql","trustedinstaller","safedogsiteiis","write","360cleanhelper","sw_magik_gss","wd160session","smsservice","360rps","win1nit","npinst","xmrig","mrservicehost","360rp","hrate","xmr","laozi","csrs","postgres","csrv","safedogguardcenter","sl_gps_msg","javaservice","lsass","taskngr","dc","aipcopywlh64","xqjxke","sl_gps_rule","svhosts","qqexternal","streamserver","qv","sapstartsrv","avgcsrva","360se","alarmservice","nscpucnminer64","thunderplatform","xmrig32","ntrtscan","arp","a8service","msiexev","rsturboball","sl_join_bb808","ramdial","sl_upload809_1","beasvcx64","ptzproxyservice","connect","runtimebroker","system64","win1ogin","sql31","vmware","systemiissec","werfault","w3wp","snmpd","conhosts","taskhots","icrawlers_fbs_cjd","systmss","calcserviced","wmiprvser","bcompare","helppanc","memcached","qqpctray","see64","sl_join |
Grab a copy of Docker for your platform here: https://www.docker.com/community-edition#/download Follow the installation guide and tune the docker system to run with as much memory and CPU as you're willing to feed to it.
Local Debian instance: debian:latest
Metasploit: remnux/metasploit