Hackers have been concentrating on Web cafés in South Korea because the second half of 2024, exploiting specialised administration software program to put in malicious instruments for cryptocurrency mining.
In line with an in depth report from AhnLab SEcurity intelligence Middle (ASEC), the attackers, lively since 2022, are utilizing the infamous Gh0st RAT (Distant Entry Trojan) to grab management of techniques, in the end deploying the T-Rex CoinMiner to mine cryptocurrencies like Ethereum and RavenCoin.
This marketing campaign particularly focuses on techniques working Korean Web café administration packages, that are integral for monitoring buyer utilization and calculating charges.

Goal South Korean Web Cafés
Though the precise technique of preliminary entry stays below investigation, the dimensions and precision of those assaults recommend a deep understanding of the focused software program by the risk actors, believed to be linked to Chinese language-speaking teams resulting from Gh0st RAT’s origins with the C. Rufus Safety Group.
The attackers deploy a multi-layered arsenal of malware, beginning with Gh0st RAT and its droppers, typically filled with instruments like Themida or MPRESS for obfuscation.
As soon as put in, usually in paths resembling “C:map1800000.dll,” Gh0st RAT registers as a system service, enabling distant management options together with file and course of manipulation, keylogging, and display capturing.
Communication with command-and-control (C&C) servers makes use of a signature string “Degree” as a substitute of the everyday “Gh0st,” showcasing a custom-made variant.

Past distant entry, the hackers use extra payloads like Patcher malware to govern the reminiscence of administration software program processes, guaranteeing persistence via strategic file placements disguised as official system recordsdata like “cmd.exe.”
Technical Breakdown of the Malware Arsenal
Downloaders facilitate the supply of additional malicious parts, together with the GPU-focused T-Rex CoinMiner, chosen for its effectivity on high-performance gaming PCs widespread in Web cafés.
Paths resembling “%ProgramFiles% (x86)Home windows NTmmc.exe” are exploited for set up, with file names regularly altered to evade updates from software program suppliers.
Notably, some malware strains like KillProc are designed to terminate competing miners or safety processes, additional securing the attackers’ foothold.
This refined orchestration highlights a main motive of cryptocurrency mining, augmented by occasional use of instruments like PhoenixMiner.
The implications of those assaults are extreme for Web café operators, who should now prioritize system safety.
ASEC recommends protecting working techniques and administration software program up to date to patch vulnerabilities, alongside guaranteeing safety merchandise are present to detect and block malware.
Directors are urged to observe for particular Indicators of Compromise (IoCs) offered by AhnLab, together with file hashes, URLs, and IP addresses related to these assaults, to swiftly determine and mitigate infections.
Indicators of Compromise (IoCs)
Kind | Worth |
---|---|
MD5 Hash | 04840bb2f22c28e996e049515215a744 |
0b05b01097eec1c2d7cb02f70b546fff | |
142b976d89400a97f6d037d834edfaaf | |
15ba916a57487b9c5ceb8c76335b59b7 | |
15d6f2a36a4cd40c9205e111a7351643 | |
URL | http://112.217.151.10/config.txt |
http://112.217.151.10/mm.exe | |
http://112.217.151.10/pms.exe | |
http://112.217.151.10/statx.exe | |
http://121.67.87.250/3.exe | |
IP Deal with | 103.25.19.32 |
113.21.17.102 | |
115.23.126.178 | |
121.147.158.132 | |
122.199.149.129 |
Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get Immediate Updates!