Rewterz Threat Alert – Dark Nexus – Emerging IoT Botnet Malware Spotted in the Wild
April 9, 2020115 Million Pakistani Mobile Users Data Go on Sale on Dark Web
April 10, 2020Rewterz Threat Alert – Dark Nexus – Emerging IoT Botnet Malware Spotted in the Wild
April 9, 2020115 Million Pakistani Mobile Users Data Go on Sale on Dark Web
April 10, 2020Severity
Medium
Description
Hoaxcalls, a new DDOS botnet, is actively exploiting two vulnerabilities which have wide exposure in environments around the world. These same vulnerabilities are also actively being exploited in additional attacks. Unfortunately, they are also easily exploited and lead to remote code execution.
Analysis Summary
Just as the proof-of-concept (PoC) for CVE-2020-8515 was released in March, a new DDoS botnet began to exploit this vulnerability for propagation. The DDoS botnet can also propagate by exploiting CVE-2020-5722. The attack traffic has doubled since 03/31/2020, implying that many Grandstream UCM6200 and Draytek Vigor devices are infected or under active attack. Both CVE-2020-8515 and CVE-2020-5722 have a critical rating (9.8 out of 10) because they are easy to exploit. Successful exploitation means the attacker can execute arbitrary commands on the vulnerable device. With such attacks, IoT devices are a growing target for attackers.
The malware “Hoaxcalls” is built on the Gafgyt/Bashlite malware family codebase, and is capable of launching a variety of DDoS attacks based on the C2 commands received. In addition to its advanced DDoS capabilities, Hoaxcalls also exploits the said vulnerabilities for propagation. The bot then connects to its C2 server 178[.]32[.]148[.]5 on TCP port 1337 over IRC. The C2’s IRC channel is #hellroom. The nick, ident, and user are strings with length 13 that always start with XTC|, followed by 9 random characters. The following figure shows the bot’s C2 communication with its C2 server over IRC.
Exploit in the Wild
The first incident of CVE-2020-8515 exploitation occurred on March 31, 2020. In addition to this attack, several bots’ attempt to propagate by exploiting CVE-2020-5722 were also caught. In the case of CVE-2020-8515 exploitation, the threat actor attempted to download a shell script to the tmp directory, and execute the downloaded script. In the case of CVE-2020-5722 exploitation, the payload only downloads an arm7 binary and executes it.
Impact
- DDoS
- Remote Code Execution
Indicators of Compromise
Hostname
irc[.]hoaxcalls[.]pw
SHA-256
- 762ba1a2f7d62b8fc206ffb1bf39e89db651a1abb584402f9939d91a5b7899d3
- ae447f9cad4f4909c576c577a94aa3d38be7b9636c9b7fb04a181caca42ea92b
- 8777e47ab84fb681379b2253735aa1490d69e94201d57f06334c9ddfb1063637
- 695a0b2ef0d46027d2f106c060dade52b34e3bb7342a8eae906c7d2b15a99fc3
- 53aaee7d0de64b71ea0c61ec62b4fb509850f915b574b2560e98692057d32a1c
- df5ba0630a0fe701afccc129be7e9612cb4016dcc70273b748dad66dc152b6e9
- e2dc3e0956a818fb22a77c50d9cfe91b7639c727db8a6838efd368ba277664b1
- f4cf6a033aac287ff0b5171ce6f64836691b822f76705b04445f52f643da8c10
- 72492605815c59579170adef1519231a5e3f17ada26428d20bd7948041c812a3
- 9a62763da3dc8c1de87b50271a7b446e753016f72f5631e1c6eb17ff5425e7ab
- b7b94fac1067217914d99f2d98b34c310a6c53eb36d3a430eea5df8217c4d1f8
- 41ef0133acaca395ea957e796dc1b939b9825b1414541c616b8ca8bdfadb8d16
- c3ea39b0cc786dcda73821f60b42d84c9557e9e590d7f3b4a328eb7a6e6559f4
- 19270639537a2241861eae2bbf4b4095fc6e1915e4dee476d2e4f277992733fd
- 82bb86e2041f4e37187ceb93bcbc48bd8311274ef33a166c6a8e0e9ffe33b585
- b32dcd47377b781c17a6ae7c88d4e1a4294d539ba8f452d980b78a9611d1cb6f
- aa69b3ac7b55fff5dde4491e4153954b31c36d528fdb390495b9bd7bc1a0c77b
- f31c7e7be06d8d6ec13337c76ca86b3692b3f5d7632e20b725d3542b3e316e62
- e31d945930048f0c06a84942212e5a14b75cee7538fbf0c9c0e1759546c7f6b9
- ded7ce9588d47885fc6a9a360e1d3561478d4be71d0971aaf76995621eb94db3
- 0820eba0c16325b9cd24c54d6655f6d9aeb2e28b4fc82d6da598b71139aceb5e
- df4e8168357559280db011eaf88088a8493b6e20df4ace06069b93c6d28af3ee
- 931b1e85e19b138a4a3bf3890749b8884a5ff4a6b34c1df3b9083d7f304e5694
- 06d019d1266bb345fc85df991b419474026d3e21a8b8a1328bad77fbfeb8cb00
- 6be47cf2f418d9729cdb1eb03885ab14e07a5955e63b06062fec97b567f959de
- 3c66db7df3f84633dbe6ed7b84911d7202c53968b88861f2463a152c839e89bf
- 8a77f9843174a53a5909554589177ce7e32d6a36a6c6ef868e4c118f98069641
- 7a5d8752049afdc8060d6a27407dcddfd9d7642c14600f586767c67afe0ef64b
- c0df164ac0af7cca5cb02e66d181bc80ed9d58cec038b82ed170ebb75b78645f
- 72d6846b9e004662cd7f2d10fdc66d02ca9b5eb545582529a935f6ff5cd2a9e7
- 02eb5d0d8ddbd68ff459b3bb388484b841ac23cb9604b9a9e503f9dcf9c49186
- 27fc18936f445fc0d2ede1d6fb301594d352d86268b4b1590dad535c7051c5ef
- f62819deb8fe2a96fa34137f6eb1d5e2e0a8e52594f9a51e78f4a2c13f5a7b96
- c0a958ea24c585d1bc99b562835e95f7d2c4a57674085df668dbbf7baa2b9fe8
- b6619dbeb420f4ee824115987c116540604356b115641d1f3c740846689b6a7b
- 65100dbe19870b6be1b398c6185b25d3a502dfb2b5166ba0d1a938b607ea1880
- 527bd14dfec20820e84c64b0f0924ae1272d9d3920b38c998a131a21e53a5789
- a27c04ce5769953e860ed473641c1a562293d01b75230bbcb803d66df4512daf
- 3ffc07cb1c7c08a5b43e4acfefbab9cb45df88bc9bd8dc2bcb489d350e18c8a1
- 59f71ff3d2df1f8c3f12e2844b78545de1fdfdabc1d80a7221ad75b24af986e2
- 9fe8885439dec03cc0056324b5e2910d363ea139e7167bc9257c2cf7a9e1ba33
- 0a210410ef5f5cb85b2aa0e0530cb7763f354850f25cd9763b1154126f92c699
- ef7b2e41bf4cbb4d99ca37f028ccae3f47a2b8e21b6fd46f15fe34d3bcf1395a
- 20d1e4ee888c2af8ee9b169f6c32290f3c378aa616519e374c7b15b6f7e4e3cf
- eb225d38828ae996463586554ddc2d30507e9e472667ae92a61ccb13c39a42f4
- 73bbf4b38904cc17b5267064dda940a080965aa55a1a9d93dd36d21720ea91dc
- 388acd6a1a2ce446247f88b2370fda71092bbc28f7af3cbd759d6f97b9ab26fd
- 5dbf6618d2d5e54d209f2befd4873c1c361893e822ca614cca9bad18aca75e01
- 54df5531d1fdd8bb4f1d499ccbe055506a840860fcc08bf4d31bcc8a02296113
- 02eb5d0d8ddbd68ff459b3bb388484b841ac23cb9604b9a9e503f9dcf9c49186
- 06d019d1266bb345fc85df991b419474026d3e21a8b8a1328bad77fbfeb8cb00
- 07b71cd9093e22fd89e2e0ce9c4a67f93675bb227724b4f7542ab66c67097d45
- 0820eba0c16325b9cd24c54d6655f6d9aeb2e28b4fc82d6da598b71139aceb5e
- 0a1951d5488b70e5f9c504c8134adfff5cbd52c5bee87b41a69ba46c978751aa
- 0de057cd8075a7a95dc7ce18632c2a342d69fa26700c52ccc256dc0bf37198c7
- 0deb223ebb948619f0f6de334c2f7e0390547e0f905d54556c29605b3d6b8a26
- 19409cb3169c3bfad4e65a1c4d18df855c87eff63683bd2b93aa36dee746cef8
- 256db410dcc76f2ada308a20a6cfa489a26a5b7aac44ed122d12ac66c8070c7f
- 27fc18936f445fc0d2ede1d6fb301594d352d86268b4b1590dad535c7051c5ef
- 293d534fca05c2383849d50eb77a4e61c0b30b91f02dc9dd89fb7bf826eb83e5
- 2cac4daa388fbacc05ae0f99e9c146c18e70e89ab95b6ae649abddca9f801267
- 302af2e17c4ecdc468ab59b8f86d5b3adb824406685027d297f63bd7a7c80685
- 323fb07dfd54a485665468d97a94dcdbdb4c469c5a1a7af9e15f83a7d667f4ea
- 34322b2641c5dba9e044d3acd855da3943fc456dc9be05cc402f1ab730d97321
- 3a2138786d012af66ac49e4ae3de97efb852006ecdd356da40a5c98d1cfbd872
- 3b9d527d7e67465d78b14e4a628e68903de01127e7409afce61d4ca7ba0dfbbf
- 3c66db7df3f84633dbe6ed7b84911d7202c53968b88861f2463a152c839e89bf
- 3d96d12f434173e0c5691f26c980b1157dd84f77df98de61f2f214fbb34c0a84
- 41ef0133acaca395ea957e796dc1b939b9825b1414541c616b8ca8bdfadb8d16
- 41f98a985173d4f92f97f7b6d679b3078b0288caafcbf3033209b9e08aacd721
- 488821f7809673e380e50a8eec24db5bb00b4cfe9176ec85bdf8b17eca13ebcf
- 48a595e19720dcd6a57aa8647422a21a4680a3642e4bee8975a5f17da71b6994
- 49344ceb14a65041a09530d5d21498c0efb7c52acb8b0f06b6983922e4edfe41
- 50cff66f9e2a20f78d7e76c8db316c6e9bd09c019f80ac91c9e3016d26abfeb4
- 51138ebb4e773e822ceace1b571d4a72269ada92d6ddec8639ba1d558ffa7d35
- 523cfd05d0b10607bccf1a76bc9dc208a267be18dc274653a2300fb73d805e3b
- 53aaee7d0de64b71ea0c61ec62b4fb509850f915b574b2560e98692057d32a1c
- 5d9e24cdd842e6f8439c86b533c842ab41c4ddb6909301b52cda9430f7bb86a7
- 6330b698bca0fcfbf2883c597454dcec7ade3a5bf6d25f5770e4f37100e17bde
- 66e65a7273221bed3a7bd34d01ba87182e4940cf8d61ce6a440cfb4a88496855
- 695a0b2ef0d46027d2f106c060dade52b34e3bb7342a8eae906c7d2b15a99fc3
- 6be47cf2f418d9729cdb1eb03885ab14e07a5955e63b06062fec97b567f959de
- 72492605815c59579170adef1519231a5e3f17ada26428d20bd7948041c812a3
- 72d6846b9e004662cd7f2d10fdc66d02ca9b5eb545582529a935f6ff5cd2a9e7
- 762ba1a2f7d62b8fc206ffb1bf39e89db651a1abb584402f9939d91a5b7899d3
- 77d3d79c2c53b88b557f1aad6bae6f9d6ec92c1b1c043a95894620bbbbfce4be
- 79f59593d4a1a669bf8e2ef8749eb556303fbcaed032c67a52b03b696fe2f8de
- 7a5d8752049afdc8060d6a27407dcddfd9d7642c14600f586767c67afe0ef64b
- 7dc6eea0dd325291a06c7769b268fca01bb3d89f0e86ba4c4633bc17751a383f
- 822dd6afb32059b6235ad56f931457bf82b824c977f47abc446102fe7c0647b3
- 82bb86e2041f4e37187ceb93bcbc48bd8311274ef33a166c6a8e0e9ffe33b585
- 837cf1d050c89e28d0a847307641c2ad9ffc94d31f692dbdf496982e951e0fdf
- 84492d0457a2a1f57afd965c64c40ee63fcb3054754bdfae5046c0b940750582
- 8777e47ab84fb681379b2253735aa1490d69e94201d57f06334c9ddfb1063637
- 8a77f9843174a53a5909554589177ce7e32d6a36a6c6ef868e4c118f98069641
- 8f5543556ed0929a755b512d58fc97643d4f3685b7b01f6e18c291e35ceb54cf
- 931b1e85e19b138a4a3bf3890749b8884a5ff4a6b34c1df3b9083d7f304e5694
- 97694a5bf3585ef6d1a4cb8841872fedc557bd19ee159015a74bf964fa73dde0
- 97b13f8e073bf88557cf4263f5dabded8e9979e0f1aadae449241655ed0d8499
- 992b72da60cc4f1756b0a6342e5e71979f54ef6eba22c4faf7106e894ca062cd
- 9a62763da3dc8c1de87b50271a7b446e753016f72f5631e1c6eb17ff5425e7ab
- 9e4bf806a3f6986a981fd2fb8a14f99008fda1fd38738316d12d2a742096b6e9
- aa69b3ac7b55fff5dde4491e4153954b31c36d528fdb390495b9bd7bc1a0c77b
- ae447f9cad4f4909c576c577a94aa3d38be7b9636c9b7fb04a181caca42ea92b
- ae692f3134e0fddbdf0cc41e176ede7d2a525fa8155b7b4724956ba2d51d7589
- aef1d674b7b21e3210dba61028083a6537406922b87730b9494f3a3f75eb07a3
- b32dcd47377b781c17a6ae7c88d4e1a4294d539ba8f452d980b78a9611d1cb6f
- b3afdfdd65e8d21e5a6d35969c9d315ee6f937364adaabebb5913e642d6feede
- b7b94fac1067217914d99f2d98b34c310a6c53eb36d3a430eea5df8217c4d1f8
- b8fefd64070ae89ac7d6e9f1423bcf14785d7c5ff2d7417451264710f30b54cc
- c0df164ac0af7cca5cb02e66d181bc80ed9d58cec038b82ed170ebb75b78645f
- c3ea39b0cc786dcda73821f60b42d84c9557e9e590d7f3b4a328eb7a6e6559f4
- cf0ec3f0ee8f7d538e3fa2d678d90fea26907ccf56a9dd77a7056d57b0c63bdb
- d183596356b00d86bd6a3b647b170978e47d39a3e8cb33d6e30fbb8af111e314
- d48b0c35cc931dd84664824a14b1675978b40bcaeee8aab2b06eaa0a7b41d8f3
- ded7ce9588d47885fc6a9a360e1d3561478d4be71d0971aaf76995621eb94db3
- df4e8168357559280db011eaf88088a8493b6e20df4ace06069b93c6d28af3ee
- df5ba0630a0fe701afccc129be7e9612cb4016dcc70273b748dad66dc152b6e9
- e07fe92781177ca0baf00bd456e9dabe6496ae86df1db2bd5ff5e2dcbbbee158
- e11ca4bde56d2c7711a777421b445a53601516142dc949f97477f0c1458bff1e
- e2dc3e0956a818fb22a77c50d9cfe91b7639c727db8a6838efd368ba277664b1
- e31d945930048f0c06a84942212e5a14b75cee7538fbf0c9c0e1759546c7f6b9
- e32106c161081bcea765017657215c5f97f837dc68aa51ff0f24ce9fefaac7e3
- e54d1842519820f02ab8e1560f666f112d636de74c11729b41739dfb316fa3a5
- e9bd90e5807af36bc2cca9769188a39050aa7ae6c193e67c588a73a555149f71
- eab4b5a1f32cbd0840adb19e8f189019fbf9b20508883a15d3bdecd90bffad28
- f21a9dc8f9c16a942e9c18729813bd3fb9f6e1408df68731160d7fe506f29bc6
- f31c7e7be06d8d6ec13337c76ca86b3692b3f5d7632e20b725d3542b3e316e62
- f4cf6a033aac287ff0b5171ce6f64836691b822f76705b04445f52f643da8c10
Source IP
- 178[.]32[.]148[.]5
- 18[.]185[.]109[.]135
- 192[.]3[.]45[.]185
- 164[.]132[.]92[.]180
Remediation
- Block the threat indicators at their respective controls.
- Immediately patch vulnerable products, if any.
- Close TCP port 1337 where possible.