-
sech1You don't need to use the proxy
-
sech1p2pool can handle multiple connections
-
Cindyah
-
Cindyi guessed that
-
Cindylike it seemed useless to have xmrig-proxy and p2pool on the same server
-
Cindythank you sech1!
-
m-relay<crypt0_bear:matrix.org> Is the quibic-li client not open source? github.com/qubic-li/client
-
m-relay<crypt0_bear:matrix.org> I see binaries but I do not see any source code.
-
m-relay<crypt0_bear:matrix.org> (Trying to figure out if they are doing dynamic code execution or just shipping with xmrig)
-
Cindyit looks proprietary
-
Cindyyou could do a strings on the exe file and see if they're using xmrig
-
Cindyi mean, if they are, it would be a violation of xmrig's license since they're not shipping the source code anywhere
-
m-relay<crypt0_bear:matrix.org> Yeah. I got the bins. The alienminer seems to be another proprietary one. They have a hiveos config as well that is just doing another random bin install. I can setup a vm and tear it apart but I am pretty sure that they are just shipping xmrig with it
-
m-relay<crypt0_bear:matrix.org> If they are not. Then the program is basically a RAT and just updates dynamic shellcode
-
m-relay<crypt0_bear:matrix.org> Which I doubt they implemented. They probably just had xmrig hardcoded on there and then the parent pool can basically send the command to run the program
-
Cindyif they are shipping a modded version of xmrig
-
Cindyit is grounds for GPL violation
-
Cindyunless they uploaded the source code
-
m-relay<crypt0_bear:matrix.org> There is no mention of it on the docs or anything like that
-
m-relay<crypt0_bear:matrix.org> I am trying to follow the logic of the ai training part. But the xmr stuff seems to be hardcoded since there is no reference for the ai training stuff yet
-
m-relay<elongated:matrix.org> It’s a scam coin, they are mining xmr and paying in worthless tokens
-
Cindyjust finding mentions of xmrig inside the binaries are suspicious
-
Cindyyou should go dig deeper in the binaries (after extracting them) to see
-
Cindyelongated: exactly, the miner program being proprietary is already a red flag
-
m-relay<crypt0_bear:matrix.org> I was trying to figure out the mechanics of their xmr mining. They claim it is all done via their chain communication. which means you could bypass their greedy mining by snooping into their mempool basically.
-
Cindyand also tied to a centralized platform
-
m-relay<crypt0_bear:matrix.org> Also if they are going with full dynamic exeuction then that means that pools basically have full RCE over miners.
-
m-relay<crypt0_bear:matrix.org> Just trying to figure out the mechanics since they promise the sky and back but I don't see any source code.
-
m-relay<crypt0_bear:matrix.org> Looks like a marketing stunt betting on not everyone cashing out the new tokens. Basically funding via rehypothecation with xmr as the payout currency
-
Cindythe client is proprietary and tied to their site
-
Cindyso it's not decentralized
-
Cindybtw, "full dynamic execution" is vague
-
Cindyfor example, xmrig does full dynamic execution, it has a JIT engine that allocates a big code buffer to recompile RandomX code into the native CPU instruction set
-
Cindyof course, if they wanted to do RCE, they could tweak xmrig's JIT to have a little.. something special to it
-
Cindywithout arousing suspicion
-
m-relay<crypt0_bear:matrix.org> Yeah but xmrig is basically a vm. Their execution is basically done so as virtualization. This would be like they run xmrig in memory but I doubt it
-
Cindyxmrig is not a VM as i can see it
-
Cindyit's more closer to a video game console emulator
-
m-relay<crypt0_bear:matrix.org> Based on their docs, the full computation would mean you run actual executable bins via in memory.
-
Cindybut for some CISC set
-
Cindyi mean, it'll be recompiled to instructions for the native CPU and executed
-
Cindy(nobody would mine in interpreter mode)
-
Cindyand so i'd think that they could make a modification to xmrig's JIT engine, to have an opportunity to sneak in custom x86 code
-
Cindybut not actually include it directly in xmrig's code
-
m-relay<crypt0_bear:matrix.org> so virtual machine right? Not trying to split hairs but basically close to what something like the eth EVM would be. You just run itterations to then figure out the next inputs. But the actual binary that runs is native code. But the "virtual" code inside the calculations is running inside of that. It is not just executing into its own process. (Long day so language skills declin<clipped message>
-
m-relay<crypt0_bear:matrix.org> ing. if it does not make sense)
-
Cindyyes
-
Cindybut xmrig likes to recompile the "virtual" code into native code
-
Cindyfor a ton of extra performance
-
Cindy(also i realized i was retarded, so yeah randomX is kinda like a virtual machine)
-
Cindyxmrig actually executes the native code within its own process
-
m-relay<crypt0_bear:matrix.org> I don't think they modified. They are just having their bins dump it as either a bundled embdedded exe or later on curl to get their version. But from their docs for them to have a full execution of ai training programs then that means their miners would be capable of executing new in memory shellcode right?
-
Cindyyes
-
Cindythey could allocate a big code buffer and download shit for their program straight into that
-
Cindyand execute off of the buffer
-
Cindyof that buffer*
-
m-relay<crypt0_bear:matrix.org> Yeah xmrig is self contained. It is a really simple instruction set too so not really something with a huge attack surface for busting out of the thread. (Especially since you are just hashing at the end of the day).
-
Cindyyes, but i'm referring to the case if they modified xmrig
-
Cindysince the client is proprietary
-
m-relay<crypt0_bear:matrix.org> Yeah so at best they are just including xmrig and at worse they are adding a shellcode loader into their miner
-
Cindyit's also important to note, xmrig is most commonly ran as root
-
Cindybecause of its one-time init code (tbh xmrig should descalate after that)
-
m-relay<crypt0_bear:matrix.org> I downloaded the bins I could find. I'll spin up some vms next week and then reverse them. I was curious what they did for them. Was late to the 51% drama
-
m-relay<crypt0_bear:matrix.org> huge pages support too
-
Cindyall of those are done one-time
-
Cindylike setting up kernel parameters and MSR registers
-
Cindyxmrig can be ran as non-root if you do all of that yourself
-
Cindythey are not gonna reach 51% and push people to run their literal virus lol
-
Cindyto mine XMR
-
m-relay<crypt0_bear:matrix.org> Ok yeah I see they give instructions for huge pages an non root since their docs mention that the miner can download and exec runners which are apps
-
Cindyi like how cfb is saying their crappy shitcoin is decentralized
-
Cindya decentralized shitcoin where you have to register for an account on their site
-
Cindyand mine with a proprietary executable
-
Cindy"decentralized"
-
m-relay<crypt0_bear:matrix.org> Yeah I'll dig through these bins next week
5 hours ago