blog.netlab.360.com
Open in
urlscan Pro
101.199.252.231
Public Scan
URL:
https://blog.netlab.360.com/ddos-botnet-moobot-en/
Submission: On March 12 via manual from ES — Scanned from ES
Submission: On March 12 via manual from ES — Scanned from ES
Form analysis
0 forms found in the DOMText Content
* Botnet * DNSMon * DDoS * PassiveDNS * Mirai * DTA 360 Netlab Blog - Network Security Research Lab at 360 — An Update for a Very Active DDos Botnet: Moobot Share this 0-day AN UPDATE FOR A VERY ACTIVE DDOS BOTNET: MOOBOT Moobot is a mirai based botnet. Spread through weak telnet passwords and some nday and 0day vulnerabilities. * * HUI WANG, ALEX.TURING Jul 9, 2020 • 5 min read OVERVIEW Moobot is a Mirai based botnet. We first discovered its activity in July 2019. Here is our log about it[0]. And ever since then, its sample updates, DDoS attacks and other activities have never stopped.Recently we saw it participated in some very high profile DDoS attacks, we got asked quite a few times in the security community regarding to what botnet is behind the attacks, so here is some more details. SAMPLE DISSEMINATION Moobot samples are mainly spread through weak telnet passwords and some nday and 0day [1][2]vulnerabilities. The vulnerabilities we observed using Moobot are as follows: Vulnerability Affected Aevice HiSilicon DVR/NVR Backdoor Firmware for Xiaongmai-based DVRs, NVRs and IP cameras CVE-2020-8515 DrayTek Vigor router JAWS Webserver unauthenticated shell command execution MVPower DVR LILIN DVR LILIN DVRs GPON Router RCE Netlink GPON Router 1.0.11 TVT OEM API RCE TVT Digital Technology Co. Ltd & OEM {DVR/NVR/IPC} API RCE ThinkPHP 5.0.23/5.1.31 RCE Android Debug Bridge Remote Payload Execution AVTECH Devices Multiple Vulnerabilities AVTECH IP Camera / NVR / DVR Devices CVE-2017-17215 Huawei Router HG532 Netcore Router Udp 53413 Backdoor Netcore Router CVE-2014-8361 Devices using the Realtek SDK CVE_2020_5722 Grandstream UCM6202 CVE-2017-8225 The Wireless IP Camera (P2P) WIFICAM DVRIP backdoor SAMPLE ANALYSIS In the previous article, we introduced many variants of Moobot. We believe that its author is more inclined to develop and use new methods than to simply change C2. The authors of Moobot had made many attempts at the sample binary level & network traffic level. Generally, samples used multiple combinations of the following methods to make job difficult for security researchers. * Use DNS TXT to carry C2/ manually construct DNS TXT request * Packing with the new UPX magic number * Hidden sensitive resources using encryption method of code table replacement * Use SOCKS PROXY, TOR PROXY Since Jan 2020, another variant we called Moobot_xor became active. Moobot_xor doesn't adopt mothods metioned above,but just only modified the register message?). Maybe the author of Moobot has found that only one such simple modification and the constant replacement of C2 is needed to achieve very good benefits during the operation for up to 1 year, there is no need to invest in new technology research. SAMPLE INFORMATION MD5:98c8326b28163fdaeeb0b056f940ed72 ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Packer:None Lib:uclibc Verdict: Moobot_xor Moobot_xor is very close to Mirai, so we are not going to cover things folks already knew. We will only introduce Moobot_xor’s encryption method and the communication protocol, understanding the encryption method will help extract the bot's configuration information, knowing the communication protocol should facility tracking C2 to obtain the attack instructions, we hope that these contents can help the community to better fight the Moobot family. ENCRYPTION METHOD Moobot_xor uses Mirai's classic Xor encryption and decryption method, the key is 0DEADBEEFh, COMMUNICATION PROTOCOL Moobot_xor has made some minor modifications on the basis of the Mirai communication protocol. Let’s look at a few of them here. * Registration packet msg parsing ---------------------------------------------------------------- 33 66 99 -----> hardcoded magic 06 -----> group string length 67 6c 61 69 76 65 -----> group string,here it is "glaive" * Heartbeat packet msg parsing ---------------------------------------------------------------- 00 00 -----> hardcoded msg from bot 00 00 -----> hardcoded msg from c2 * Attack command msg parsing ---------------------------------------------------------------- similar to Mirai 01 -----> number of targets 77 a7 B5 CB 20 ----->target/mask, 119.167.181.203/32 02 -----> number of flags 00 -----> flag type 02 -----> flag length 32 30 -----> flag data 07 -----> flag type 02 -----> flag length 38 30 -----> flag data MOOBOT DDOS ACTIVITY Since we started tracking Moobot, its attack activity has never stopped. There are only a handful of C2s, but attack targets are all over the world, with about 100 targets per day. MOOBOT'S TARGET The trend of Moobot's daily attack targets is shown in the figure below:: It can be seen from the above figure that Moobot's DDoS attack activity has obvious anomalies from the end of March 2020 to the beginning of May 2020, and the daily attack target of Moobot has increased from a few hundred to nearly 20,000. When we took a close look, we found that Moobot's attack target surged because Moobot attacked about 48k of Brazilian IP during this period. We don’t know what was reason behind that. After taking Brazil our from the attack targets. Moobot's daily live attack targets are as follows, about 100 attack targets per day: MOOBOT ATTACK TARGET GEOGRAPHIC LOCATION DISTRIBUTION Moobot's attack targets are all over the world.The geographical distribution of its attack targets is as follows: MOOBOT ATTACKS THE AFFECTED DOMAIN NAME We were able to confirm that Moobot has been behind some very high profile DDos attacks.We cannot disclose more detail here, but we had a tag cloud in our prior blog here[3]. CONTACT US Readers are always welcomed to reach us on Twitter, WeChat 360Netlab or email to netlab at 360 dot cn. IOC C2 190.115.18.238 AS262254|DANCOM_LTD Russian_Federation|Moscow|Unknown 31.13.195.56 AS34224|Neterra_Ltd. Bulgaria|Sofia|Unknown 37.49.226.216 AS208666|Estro_Web_Services_Private_Limited Netherlands|Overijssel|Enschede 45.95.168.90 AS42864|Giganet_Internet_Szolgaltato_Kft Hungary|Szabolcs-Szatmar-Bereg_County|Nyiregyhaza abcdefg.elrooted.com audi.n1gger.com botnetisharam.com cykablyat.raiseyourdongers.pw dbkjbueuvmf5hh7z.onion frsaxhta.elrooted.com gcc.cyberium.cc n1gger.com nd3rwzslqhxibkl7.onion nlocalhost.wordtheminer.com park.cyberium.cc park.elrooted.com proxy.2u0apcm6ylhdy7s.com rr442myy7yz4.osrq.xyz sisuugde7gzpef2d.onion typicalniggerdayatthecoolaidparty.n1gger.com wor.wordtheminer.com zrqq.xyz tbpsboy.com — 360 Netlab Blog - Network Security Research Lab at 360 — 0-DAY * EwDoor僵尸网络,正在攻击美国AT&T用户 * EwDoor Botnet Is Attacking AT&T Customers * 一个藏在我们身边的巨型僵尸网络 Pink See all 22 posts → Botnet 千面人:BIGVIKTOR 分析报告 概览 2020年6月17日,360Netlab未知威胁检测系统发现一个低检测率的可疑ELF文件(dd7c9d99d8f7b9975c29c803abdf1c33),目前仅有一款杀毒引擎检测识别;同时流量检测系统将其产生的部分流量标注了疑似DGA,这引起了我们的注意。经过详细分析,我们确定这是一个通过CVE-2020-8515漏洞传播,针对DrayTek Vigor路由器设备,拥有DGA特性,主要功能为DDos攻击的新僵尸网络的Bot程序。因为传播过程中使用的"viktor"文件名(/tmp/viktor)以及样本中的0xB16B00B5(big boobs)字串,我们将其命名为Bigviktor。 从网络层面来看,Bigviktor遍历DGA每月产生的1000个随机域名,通过请求RC4加密&ECSDA256签名的s.jpeg来确认当前存活的有效C2,然后向C2请求image.jpeg,执行具体的任务;从功能层面来看,Bigviktor支持8种指令,可以分成2大功能 * DDoS攻击 * 自更新 其整体网络结构如图所示, Botnet规模 日活Bot * Alex.Turing * Hui Wang Jul 10, 2020 22 min read 0-day 那些年我们一起追过的僵尸网络之MOOBOT Moobot是一个基于mirai开发的僵尸网络,样本通过Telnet弱口令和利用nday,0day漏洞传播 * Hui Wang * Alex.Turing Jul 9, 2020 6 min read 360 Netlab Blog - Network Security Research Lab at 360 © 2024 Powered by Ghost