Analisis Pola dan Dampak Serangan Cryptojacking dengan Menggunakan Metode Analisis Dinamis dan Analisis Statis
DOI:
https://doi.org/10.30865/jurikom.v9i5.5041Keywords:
Globalization, Technology, Cryptojacking, Step Method, Windows Safe ModeAbstract
In the current era of globalization, people's daily activities are highly dependent on technology. The development of this technology is certainly utilized by many different parties. In addition to taking advantage of the positive side, there are also parts that take advantage of the negative side. In this case it is like developing criminal software or what is commonly called cybercrime. One form of this crime is cryptojacking. Cryptojacking is the dark side of cryptocurrency mining and poses a threat to website visitors or end-users. This research was carried out with a 6-step method which resulted in the result that based on static and dynamic malware analysis, the installation of Crackonosh itself runs by replacing important files on the Windows system and abusing Windows Safe Mode to damage the order and defense of the Windows system
References
S. H. Kok, A. Abdullah, and N. Z. Jhanjhi, “Early detection of crypto-ransomware using pre-encryption detection algorithm,†J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 5, pp. 1984–1999, May 2022, doi: 10.1016/j.jksuci.2020.06.012.
D. Harley et al., “Big Bad Botnets,†in AVIEN Malware Defense Guide for the Enterprise, Elsevier, 2007, pp. 123–179. doi: 10.1016/b978-159749164-8.50010-5.
E. Tekiner, A. Acar, A. S. Uluagac, E. Kirda, and A. A. Selcuk, “SoK: Cryptojacking malware,†in Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021, 2021. doi: 10.1109/EuroSP51992.2021.00019.
“Crackonosh: A New Malware Distributed in Cracked Software - Avast Threat Labs.†https://decoded.avast.io/danielbenes/crackonosh-a-new-malware-distributed-in-cracked-software/ (accessed Oct. 20, 2022).
A. Sood and R. Enbody, Targeted Cyber Attacks. Elsevier, 2014. doi: 10.1016/C2013-0-14275-4.
A. D. YULIANTO, “Penanganan Cryptojacking Menggunakan Pattern Matching Analysis,†2019, Accessed: Oct. 20, 2022. [Online]. Available: https://repository.telkomuniversity.ac.id/home/catalog/id/151961/slug/penanganan-cryptojacking-menggunakan-pattern-matching-analysis.html
L. Y. Connolly and D. S. Wall, “The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures,†Comput. Secur., vol. 87, Nov. 2019, doi: 10.1016/j.cose.2019.101568.
U. Kristen Satya Wacana Salatiga, “Analisis Serangan Flame pada Ancaman Sabotase Sistem Jaringan Komputer,†2016, Accessed: Oct. 20, 2022. [Online]. Available: https://repository.uksw.edu//handle/123456789/11313
G. Gomes, L. Dias, and M. Correia, “CryingJackpot: Network Flows and Performance Counters against Cryptojacking,†in 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020, 2020. doi: 10.1109/NCA51143.2020.9306698.
A. Yazdinejad, H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, G. Srivastava, and M. Y. Chen, “Cryptocurrency malware hunting: A deep Recurrent Neural Network approach,†Appl. Soft Comput. J., vol. 96, Nov. 2020, doi: 10.1016/j.asoc.2020.106630.
S. Madan, S. Sofat, and D. Bansal, “Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review,†J. King Saud Univ. - Comput. Inf. Sci., 2022, doi: 10.1016/j.jksuci.2021.12.016.
H. Darabian et al., “Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis,†J. Grid Comput., vol. 18, no. 2, 2020, doi: 10.1007/s10723-020-09510-6.
K. Dunham, Mobile Malware Attacks and Defense. Elsevier, 2009. doi: 10.1016/B978-1-59749-298-0.X0001-8.
N. Widiyasono, A. P. Aldya, and R. R. Ardhian, “Analisis Pola Dan Dampak Serangan Cryptojacking Dengan Menggunakan Pendekatan Dynamic Analysis,†CESS (Journal Comput. Eng. Syst. Sci., vol. 6, no. 1, 2021, doi: 10.24114/cess.v6i1.20008.
“How to Get and Set Up a Free Windows VM for Malware Analysis.†https://zeltser.com/free-malware-analysis-windows-vm/ (accessed Oct. 20, 2022).
S. Balamurugan and M. Thangaraj, “Cryptojacking malware detection using the bayesian consensus clustering with large iterative multi-tier ensemble in the cryptocurrency in the cloud,†Int. J. Recent Technol. Eng., vol. 8, no. 3, 2019, doi: 10.35940/ijrte.C5159.098319.
D. Ko, S.-H. Choi, S. Hwang, and Y.-H. Choi, “Cryptojacking Attack Using Pastejacking and Defense Method,†J. Korean Inst. Commun. Inf. Sci., vol. 44, no. 8, 2019, doi: 10.7840/kics.2019.44.8.1623.



