Solana Drainer’s Source Code Saga: Tracing Its Lineage to the Developers of MS Drainer
2024-3-28 19:31:43 Author: cyble.com(查看原文) 阅读量:67 收藏

Key Takeaways

  • Threat actors (TAs) are actively exploiting platforms like Google Ads and social media platforms such as X (formerly Twitter) to disseminate crypto drainers, employing tactics such as compromising famous accounts, generating counterfeit profiles, and using malicious advertisements. 
  • Cyble Research and Intelligence Labs (CRIL) found multiple drainer source codes leaked on cybercrime forums, including a recent leak of a Solana drainer’s source code. 
  • The release of malware source code into the wild enables the creation of new variants. With multiple drainer’s source code leaked on cybercrime forums TAs will leverage them to create more variants of the drainer.  
  • Solana Drainer, a project developed in collaboration with MS Drainer developers, was subsequently leaked on a cybercrime forum.  
  • It was reported that MS Drainer orchestrated the theft of $59 million from 63,000 individuals. 
  • The leaked source code contains detailed instructions and configurations for deploying Solana Drainer. It also includes recommendations for server rental, domain registration, and utilization of FileZilla for file transfer and configuration. 
  • The code includes functionalities for stealing sensitive information such as seed phrases and facilitating communication through Telegram, enabling Threat Actors (TAs) to drain victims’ crypto assets efficiently. 

Overview

A crypto drainer is a malicious script designed to swiftly drain cryptocurrency wallets, transferring the assets into the attackers’ control. These drainers have evolved over time, initially targeting crypto wallet such as MetaMask and later expanding to various crypto platforms. They work by assessing the value of assets in a victim’s wallet, identifying the most valuable ones, and executing transactions and smart contracts to drain assets from wallets quickly.  

Initial Infection

Spreading mechanisms used by crypto drainers include social engineering tactics such as fake websites, emails, and documents to lure victims into providing access to their wallets. Additionally, phishing pages and counterfeit websites are created to trick users into connecting their wallets, enabling asset transfers without their knowledge or consent. Victims may unwittingly authorize harmful transactions through smart contracts, resulting in partial or total loss of wallet contents. 

How Crypto Drainer Works 

Most crypto drainers operate through a series of well-coordinated steps. It begins with the launch of a malicious campaign, where attackers set up fake airdrop or phishing schemes, often advertised on social media or via email, offering enticing promises of free tokens. Once users take the bait, they are led to a deceptive website designed to mimic legitimate token distribution platforms. 

Users are then prompted to connect their wallets to this fraudulent site, unknowingly setting the stage for the subsequent attack phase without immediate compromise. In the next step, users are manipulated into interacting with a malicious smart contract under the guise of claiming the airdrop. This interaction, often involving functions like “approve” or “permit,” stealthily increases the attacker’s allowance, granting them access to the victim’s funds. With access secured, attackers proceed to transfer the stolen assets, employing methods like mixers or multiple transfers to obfuscate their tracks and swiftly liquidate the stolen assets before detection. 

Techniques and Incidents 

TAs are actively abusing Google ads and X to proliferate wallet drainers, constituting a prevailing trend: 

  • Compromising famous X accounts and using them to spread drainers. TAs utilize these compromised accounts to post regarding fake crypto giveaway or airdrop. These posts usually consist of phishing links that are linked to a drainer. In March 2024, blockchain researcher ZachXBT reported the compromise of Trezor’s X account. The incident involved several posts made from the official Trezor account promoting a fake Trezor ” $TRZR” presale token purportedly on the Solana network. These posts encouraged users to send funds to a Solana wallet address alongside links that directed them to wallet drainers. This deceptive scheme aimed to lure users into investing in a non-existent token, ultimately leading them to fall victim to wallet drainers, which would siphon off their cryptocurrency assets. 
Figure 1 Source

Figure 1 – Source @sozachxbt 

  • Generating counterfeit profiles that mimic well-known entities on X or crafting arbitrary accounts adorned with verification checkmarks. A recent occurrence reported by Degen News involved using a fake Twitter account to spread crypto drainers. 
Figure 2 Source @DegenerateNews

Figure 2 – Source @DegenerateNews

  • TAs have been employing malicious advertisements to disseminate crypto drainers. Researchers have documented numerous instances where TAs have exploited Google and X ads to propagate these drainers. A report published by Scam Sniffer in December 2023 highlighted a concerning trend, revealing that nearly 60% of phishing ads discovered in a recent sampling test of ads on X’s feeds were associated with such malicious activities. Since March 2023, Scam Sniffer has monitored approximately 10,072 phishing websites that leverage these ads. Through the analysis of on-chain data linked to their phishing addresses, it has been determined that these malicious entities have managed to steal nearly $58.98 million from approximately 63,210 victims over the past nine months. 
Figure 3 Source @realScamSniffer

Figure 3 – Source @realScamSniffer.

Malicious Services Sold on CyberCrime Forum  

CRIL also found a post made by TA where they are selling X accounts with a blue check mark and a linked card for advertising purposes. This indicates that the TAs are involved in selling fraudulent or illicit advertising accounts, likely for use in deceptive or malicious advertising activities.  

These accounts are offered at a discounted price, with additional options available for accounts that have already been “warmed up” with previous advertising activity. The seller also offers customer support services, including advice on avoiding bans and optimizing advertising campaigns.  

The figure below shows the post made on the cybercrime forum. 

Figure 4 TA Selling Twitter X Accounts

Figure 4 – TA Selling Twitter (X) Accounts

We also encountered a post, depicted in the figure below, wherein TAs provided services that included replicating landing pages, drafting smart contracts for different networks, creating project posts using ChatGPT, designing seed phrase checkers, and developing websites with cryptocurrency address clippers. This indicates a growing number of TAs offering services related to drainers and phishing.  

Figure 5 Malicious Services Advertised by TA

Figure 5 – Malicious Services Advertised by TA

Leaked Source Code 

The leakage or release of malware source code into the wild has profound security implications. Primarily, it enables the development of new or enhanced malware variants as malicious actors analyze and adapt the leaked code for their purposes. 

We have observed numerous instances of Drainer source codes being available on cybercrime forums. This trend began with the release of the Space X drainer’s source code for free in March 2023, as illustrated in the figure below. Subsequently, Spacex Drainer V2 was initially offered for sale on a cybercrime forum for $2300. 

Figure 6 SpaceX Drainer

Figure 6 – SpaceX Drainer

A TA recently leaked the source code of a Solana drainer on a cybercrime forum, citing a non-refund from the alleged developer of the drainer. The individual claimed to have leaked the source code as a form of retaliation. Additionally, it was stated that Solana Drainer was created in collaboration with the developers of MS Drainer.  

Interestingly, this leak was caused by the same TA selling Fake X accounts and services related to malicious ads, as highlighted in Figure 4. According to reports, MS Drainer was distributed via malicious Google and Twitter ads, resulting in the theft of approximately $59 million from 63,210 victims in 2023. 

In the past, MS Drainer’s activities revealed a significant loss of cryptocurrency amounting to $24 million for a victim on the Ethereum blockchain.  

The figure below shows the post made on the cybercrime forum. 

Figure 7 Solana Drainer Leaked on Cybercrime Forum

Figure 7 – Solana Drainer Leaked on Cybercrime Forum

Solana Drainer

The file leaked on a cybercrime forum is a Zip archive. It consists of the following content: 

  • Инструкция _ Solana Drainer – Teletype.html 
    This is an instruction manual in Russian for deploying Solana drainer . 
  • SOLANA_DRAINER.zip 
    This ZIP archive file contains the source code for Solana drainer. 

The figure below shows the content of Zip file. 

Figure 8 Leaked Zip File

Figure 8 – Leaked Zip File

During further Investigation, we were able to see a phishing site “hxxps[:]//wondera[.]app/” utilizing Solana drainer. This site appears to be in the testing phase. The user interface of this site completely resembles the sample UI shared in Solana drainer source code, as highlighted in the figure below. 

Figure 9 TA Testing Solana Drainer

Figure 9 – TA Testing Solana Drainer

The figure below shows the fake DFLOW site using Solana drainer. “hxxps[:]//dflow.life/” 

Figure 10 DFLOW Phishing Site

Figure 10 – DFLOW Phishing Site

Instruction Manual 

Upon further analysis of the instruction manual, a Teletype link was discovered, leading to a post about Solana Drainer on the Teletype platform. Teletype serves as a platform for publishing and monetizing various types of content. Interestingly, the same account on Teletype was utilized to advertise MS Drainer in November 2023. This finding provides evidence supporting the claim that Solana Drainer was developed in partnership with the developers of MS Drainer.  

Figure 11 Teletype Posts

Figure 11 – Teletype Posts

The user manual urges users to rent a VPS (Virtual Private Server) with Ubuntu 20.04 operating system. Specific instructions are provided for renting a server from the 4VPS website (hxxs[:]//4vps.su/), including creating an account, replenishing the balance, ordering a server, and checking server status.  

The TAs have recommended using the 4VPS website for renting servers, mentioning the benefits such as quick issuance, cryptocurrency payment without verification (for anonymity), and checking performance with the drainer on this server.  

The TAs are utilizing FileZilla for File Transfer and Configuration. The instructions involve transferring files to the server using FileZilla and configuring various settings, such as database connections, server parameters, and frontend configurations. 

Figure 12 Utilizing FileZilla 1

Figure 12 – Utilizing FileZilla

After the configuration part, the TA recommends having a domain name and web hosting, suggesting providers like 4HOST (hxxps[:]//4host.su/) and 4DOMAINS (hxxps[:]//4domain.su/) as options. Once hosting is activated, they advise adding the purchased domain, selecting PHP 8 or higher in the domain settings, or opting for FastCGI mode or CGI if PHP 8 is unavailable. 

Source Code 

Database.json
It is a configuration file used by the drainer. TAs can edit the file to set various parameters or configurations to customize the behavior of the drainer. This file consists of the following fields:  

Field Value Description 
telegramBotToken Telegram bot token 
ownerPublicKey TAs Solana address where TAs will receive money. 
connectionKey secret key for encryption 
solanaRPCHostHTTPS HTTPS RPC Solana 
solanaRPCHostWSS WSS RPC Solana 
backendPort Port Number 

The figure below shows the Database.json file. 

Figure 13 Database.json

Figure 13 – Database.json

Config.php 
The “config.php” file contains additional configurations specific to the frontend of the drainer. Similar to the “database.json” file, it includes parameters necessary for the frontend functionalities. 

It consists of the following fields. 

Field Value Description 
$BACKEND_HOST Server IP address 
$BACKEND_PROTOCOL http 
$BACKEND_KEYCODE connectionKey added in the Database.json file 
$GROUP_CHAT_ID Telegram ID, where notifications will be sent 
$IS_CLOUDFLARED True/False (If site works through Cloudflare) 

The figure below shows the Config,php file. 

Figure 14 Config.php file

Figure 14 – Config.php file.

Settings.json 
The settings.json file contains parameters that configure the behavior of Solana Drainer. These parameters control aspects such as the amount of fictitious winnings, the number of fake transactions, the type of modal window, and settings related to Phantom Wallet phishing. These settings enable customization of the script’s behavior to suit different scenarios and objectives, such as simulating transactions or phishing attempts. 

The settings.json file consists of the following fields.  

Parameter Description 
solflareWallet.sol Number of Solana tokens (SOL) that will be presented as fictitious winnings to the user. 
solflareWallet.transactions Number of fake transactions that will be generated to simulate the receipt of Solana (SOL) tokens. 
Modal Type of modal window (0-3) 
phantomWallet.type Phantom Wallet phishing type (0 – drain, 1 – seed phishing) 
phantomWallet.sCon Displays a real Connect popup before the actual Connect popup 
phantomWallet.doublePopup.enabled Phantom double popup bypass. 
phantomWallet.doublePopup.solana Number of SOL for fake profit 
phantomWallet.doublePopup.solanaOwner A public key associated with a significant number of Solana token is utilized to simulate sending Solana tokens to the victim. 
phantomWallet.doublePopup.tokens Additional tokens to receive 
phantomWallet.lol.enabled Phantom Bypass 
phantomWallet.lol.solanaOwner Public key of a large wallet with Solana. 
phantomWallet.lol.tokens Additional tokens to receive 

Figure below shows the settings.json file.  

Figure 15 settings.json

Figure 15 – settings.json 

The parameter “phantomWallet.doublePopup.solanaOwner” contains a hardcoded Solana address “9WzDXwBbmkg8ZTbNMqUxvQRAyrZzDsGYdLVL9zYtAWWM”. Upon further investigation, it was discovered that this address holds over 10 million SOL tokens and has been mentioned in various articles as having one of the highest SOL balances, as depicted in the figure below. This indicates that the TA employs such cryptocurrency addresses in fake transactions to deceive users.  

Figure 16 Source Techopedia 1

Figure 16 – Source Techopedia

Index.html 
The HTML file serves as a template for a phishing page. It sets up the structure and imports necessary resources (CSS and JavaScript files) for a phishing page. The JavaScript files (modals.js and main.js) are responsible for handling user interactions, displaying popups to deceive users, and executing malicious functionality such as stealing sensitive information or performing unauthorized actions. Figure below shows the index.html file.  

Figure 17

Figure 17 – index.html 

Main.js 
The JavaScript file is designed to facilitate interactions with the Solana blockchain and associated wallets. It encompasses various functionalities, including transaction handling, execution, and popup management using modal. The transactions involve transfers of SOL tokens and other tokens linked to specific wallets like Solflare and Phantom. Figure below shows the main.js file.  

Figure 18 main.js

Figure 18 – main.js 

Index.js 
This file is a part of a backend server application. It sets up various routes to handle incoming HTTP requests related to user interactions with a web application. These interactions involve accepting, joining, canceling, or requesting actions related to wallet connections, transactions, and other activities associated with blockchain operations. Figure below shows the index.js file. 

Figure 19 index.js file

Figure 19 – index.js file

The code includes a route /inf that handles incoming POST requests related to seed phrases. When invoked, it extracts seed phrases from the request body and sends them, along with other relevant information such as IP address and country, to a Telegram chat using the sendMessageToChat function. The seed phrase is a string of characters used to recover crypto assets. TAs leverage these phrases to access victims’ crypto assets and drain them. 

Figure 20 Stealing Seed Phrase

Figure 20 – Stealing Seed Phrase

This script also sets up a Telegram bot using the node-telegram-bot-api package and defines functions such as sendMessageToChat(). This function sends a message to a specific chat using the initialized Telegram bot instance. It takes parameters like the chat ID, message content, and optional reply markup. It handles exceptions and logs errors to the console.  The figure below shows the sendMessageToChat() function.  

Figure 21 sendMessageToChat

Figure 21 – sendMessageToChat().

Furthermore, various alerts are sent to the Telegram chat as follows: 

  • New Transaction Notification: 
    Purpose: Notifies about a new transaction. 
  • User Connected Wallet Notification: 
    Purpose: Notifies when a user connects their wallet. 
  • User Opened Website Notification: 
    Purpose: Notifies when a user opens the website. 
  • Request Rejection Notification: 
    Purpose: Notifies when a user rejects a request. 
  • Seed Phrase Notification: 
    Purpose: Notifies when a seed phrase is received. 
  • Withdrawal Request Notification: 
    Purpose: Notifies when a user receives a withdrawal request. 

Conclusion

The proliferation of crypto drainers represents a significant threat to the security of cryptocurrency users, facilitated by sophisticated social engineering tactics and the active involvement of threat actors. The release of source code into the wild enables the rapid evolution of malware, posing ongoing challenges for cybersecurity professionals and law enforcement agencies. 

The impact of these malicious activities extends beyond financial losses, eroding trust in cryptocurrency platforms and tarnishing the reputation of legitimate entities targeted in fake campaigns. As threat actors continue to innovate and collaborate, the future landscape of cybercrime will likely witness further advancements in malware sophistication and distribution techniques. 

Our Recommendations

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below: 

  • Always double-check the URL of cryptocurrency websites before entering sensitive information. Ensure that the website address is spelled correctly and uses HTTPS encryption. Avoid clicking on links from unsolicited emails or messages. 
  • Keep a close eye on your cryptocurrency accounts for any unauthorized activity or suspicious transactions. 
  • Implement robust security protocols for all cryptocurrency platforms, including multi-factor authentication, regular security audits, and intrusion detection systems to mitigate the risk of unauthorized access and exploitation. 
  • Review and update advertising policies on major platforms like Google and social media networks to prevent the dissemination of malicious ads promoting cryptocurrency scams. 

Indicators Of Compromise

Indicators Indicator Type Description 
hxxps[:]//dflow.life/ hxxps[:]//wondera.app/ URL Phishing Sites 
7bc6e936176a03e719d55d7597ed47fc72ce63eeca20470cad94a66f9f3b3ae7 SHA256 SpaceX Drainer 
05bc32a2589c3784970e71d549268e2d832cd51a61ecbdc912e9d527444e9b09 SHA256 Solana Drainer 

Related


文章来源: https://cyble.com/blog/solana-drainers-source-code-saga-tracing-its-lineage-to-the-developers-of-ms-drainer/
如有侵权请联系:admin#unsafe.sh