• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Indicators of Compromise – GetCrypt Ransomware
May 29, 2019
Rewterz Threat Alert – Email Campaign Distributing the Lokibot
May 30, 2019

Rewterz Threat Alert – New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

May 29, 2019

Severity

Medium

Analysis Summary

A new variant of Mirai exploiting a large number of vulnerabilities. This variant leveraged 13 different vulnerabilities targeting routers, surveillance products, and other IoT devices. Though all of these vulnerabilities have been seen in various Mirai variants, this is the first variant containing exploits for all 13. Once exploited, a victim device connects to both its C2 and a few downloader/dropper URLs. It then spreads to other devices on the network by scanning for and exploiting detected vulnerabilities or performing brute force attacks.

Indicators of Compromise

URLs

  • http[:]//32[.]235[.]102[.]123
  • http[:]//ililililililililil[.]hopto[.]org/love[.]sh
  • http[:]//ililililililililil[.]hopto[.]org/shiina/tmp[.]arm7
  • http[:]//ililililililililil[.]hopto[.]org/shiina/tmp[.]mips

Malware Hash (MD5/SHA1/SH256)

  • c15382bc81e1bff4cf03d769275b7c4d2d586a21e81ad4138464d808e3bb464c

Remediation

  • Block all threat indicators at your respective controls.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.