• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Elusive Ransomware Sodinokibi
August 13, 2019
Rewterz Threat Alert – First Microfinance Bank Targeted by Indian Hackers
August 14, 2019

Rewterz Threat Alert – New Mirai Variants could enable DDoS Attacks

August 13, 2019

Severity

Medium

Analysis Summary

Within a span of three weeks, three notable malware variants of Neko, Mirai, and Bashlite were observed. Upon analyzing Neko botnet sample, then observed another sample with additional exploits the following week. A Mirai variant that calls itself “Asher” surfaced on July 30, then a Bashlite variant called “Ayedz” the following week. These malware variants enlist infected routers to botnets that are capable of launching distributed denial of service (DDoS) attacks.

Neko


A botnet sample, x86.neko (detected by Trend Micro as Backdoor.Linux.NEKO.AB), that brute-forces weak credentials. It then issues the following commands:

image-1565719129.png

The Neko botnet is capable of executing several backdoor commands: it can execute shell commands as well as launch user datagram protocol or UDP and UPD-HEX flood attacks, inundating a router’s ability to properly process and respond to information.

It is also capable of killing processes (the “killer” function is found in its body). Neko also holds within it an extensive kill list of other malware-related processes that it will terminate.

Mirai variant “Asher”


A Mirai variant (detected by Trend Micro as Backdoor.Linux.MIRAI.VWIRC). Typical of Mirai, this variant infects devices with a BusyBox, which is a software suite for devices with limited resources. It first checks for BusyBox presence by executing the “/bin/busybox {any string}” command. If the device’s system responds with “{any string} applet not found,” the bot will proceed with its operation. The malware variant’s authors used the {any string} part to “name” the malware; in this case, they used “Asher.”

Bashlite variant “Ayedz”


A Bashlite variant that seems to refer to itself as “Ayedz” (detected by Trend Micro as Backdoor.Linux.BASHLITE.SMJC, Backdoor.Linux.BASHLITE.SMJC8, and Backdoor.Linux.BASHLITE.SMJC4), based on this malware’s file name. Upon execution, Ayedz will send the following information about the infected device back to the host IP address 167[.]71[.]7[.]231 via port 46216:

fig-14.png

Impact

  • Distributed denial of service (DDoS)
  • Credential theft

Indicators of Compromise

URLs

  • http[:]//185[.]244[.]25[.]200/bins
  • http[:]//185[.]244[.]25[.]200/bins/x86[.]neko


Malware Hash (MD5/SHA1/SH256)

  • 2efae6727d3f5a4a2e7b88ef1e657f6a6e2e6e1c08af0746205dc3c7afe4094d
  • 8e592655cef0dc4a1a209b6f8909a95e2bbf421ecf8312a3b4d07960fb906a5f
  • 754285c82042ca8326be39988fceb39882d301fbcd3533ce31704027c445f72c
  • c3626284fb68b6bf76d212441d88a5a30ae5d98b13a63b9e7358efc8c1c42215
  • ebc2bb1901112c9f957855b25091c21f55a4c7d5f95b3d918f85c1924c8d31b0
  • 86aa444a10c9c0c33a8f94ad71fd9d2b985e2e624872cd1c351aeaa7a4d6645f
  • 416dada9ab2ae2f160363965540d5776dc2fb4e086064d97d95a11c4a90c67cd
  • c81cbf35dbbe2502b32ce02cc55c307b6036d9d10f7d7a0a6da127592caeaf0a
  • 5df2af777ba958b7180b71fc365595141582d8604eba7c70f635a38139503439
  • abea038f41b83f00e61e829df39c4b85453335cb9a70619702a6b9834bc7d591
  • b3434897b35c52551329a2f8e322d1fc1be618959794d6f4bff299c7e1ce2324
  • 8cbcc1af312511ebaaba24a075333835e0ac4c4754072233bccadbb996d84048
  • 329f507ceb4ed9d6a6cb5ba5e9bc6a863ef2fd12235f6ed5d46fe3ebc04cf337
  • 6df1610476044ab8c3e615ddaf66e51cfe5f4a3436f37ad15fa4f6583e83fe63
  • b382dce55bbc08b0f5ac7bbb231e55bb65f07e795cd6d382d9bb01b293ef2233
  • 86717399a76d07b72733abb2c88cefe2d2a8c3c451d758f7c8b5249ab21b9e26
  • 355df8452d6853cbf3ed44f82967d353b709b4bd04afb96de4c4a51471c0771d
  • 16ebe7836ce650db686ca62d62901b771788d8ef78b7ba0a10aa73e68a710dd5
  • 30d429d048a4f6ec86f48b4cd0955e0003b832213694cfa121b95e4c429d7980
  • f1571b3c47ab0aeff1e8094f2e1a1da604c6867409b8509ef90333ca1e9775e1
  • a2c8e598e340cc7cc27b4c045129abd9b04ddd3a592c0c41ae5c82f777b59b30
  • 55355482d12b60136fde3f5d76b2686337e4bab5248e79cf3a6b2d652a290240
  • 7ca9af2d71719134aa7cf8ca37d9fe35f4b20f2e5d6721e1d57f6e570e845669
  • a9a5262048664843edf9e2bc405f06949cb9354ab20f5efb23dd2800c0dd4681

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the link/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.