If these checks are passed, the executable displays a fake error message pop-up before continuing.
Figure 1. Initial phishing email
Figure 2. Impersonated malicious phishing site containing download links for fake “CRM application”
Figure 3. Fake error message following evasion checks
This file contains configuration information for XMRig in the form of command-line arguments that can be appended to a call to the XMRig miner executable.
The executable then downloads a copy of XMRig from GitHub, from the URL:
The downloaded ZIP file is saved to the following path:
The executable extracts the contents of the ZIP file into the %TEMP%\System\ directory and copies the main XMRig executable to the path:
The malware then runs the XMRig miner, using the command-line arguments inside the downloaded configuration text file:
Drops a Windows batch script to the Start Menu Startup directory, at this path:
This batch script executes a dropped copy of the downloaded miner, located at:
The downloaded executable performs several environment checks to evade detection and analysis before downloading additional payloads. These checks include:
If these checks are passed, the executable displays a fake error message pop-up before continuing.
The contents of the batch script are the following:
The batch script writes a new Windows Registry logon autostart key, located at:
This logon autostart entry executes a dropped copy of the original malicious downloader, located at:
This campaign highlights the importance of vigilance against phishing scams, particularly those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files. Organizations can reduce the risk of such attacks by educating employees on phishing tactics, monitoring for suspicious network traffic and employing endpoint protection solutions to detect and block malicious activity.
Outside of this campaign, we are aware of scams involving false offers of employment with CrowdStrike. Fraudulent interviews and job offers use fake websites, email addresses, group chats and text messages. We do not interview prospective candidates via instant message or group chat, nor do we require candidates to purchase products or services, or process payments on our behalf, as a condition of any employment offer. And, in reference to the campaign detailed above, we do not ask candidates to download software for interviews.
Those interested in applying for a role at CrowdStrike should navigate to our Careers page to learn about our job openings and begin our official application process. To verify the authenticity of CrowdStrike recruitment communications, please reach out to recruiting@crowdstrike.com.
The phishing site, cscrm-hiring[.]com, serves as the base for the attack, hosting the malicious executable and directing victims to download the fake CRM application. The malware establishes its presence by executing in the background, using minimal CPU resources to avoid detection. Key indicators include specific file paths, registry entries and network communication.
Indicator | Description |
cscrm-hiring[.]com |
Domain of phishing site |
https[:]//cscrm-hiring[.]com/cs-applicant-crm-installer[.]zip |
URL serving malicious executable |
93.115.172[.]41 |
IP used for Threat Actor Pool and data |
http[:]//93.115.172[.]41/private/aW5zdHJ1Y3Rpb25zCg==.txt |
Text data containing XMRig parameters |
93.115.172[.]41:1300 |
Mining Pool hosted by threat actor |