{"id":11208,"date":"2017-02-16T18:37:24","date_gmt":"2017-02-16T18:37:24","guid":{"rendered":"https:\/\/evosec.eu\/?p=11208"},"modified":"2017-02-16T18:37:24","modified_gmt":"2017-02-16T18:37:24","slug":"iot-malware-advances","status":"publish","type":"post","link":"https:\/\/evosec.eu\/nl\/iot-malware-advances\/","title":{"rendered":"IoT Malware advances"},"content":{"rendered":"<p>A new strain (as long as December 2016 can be called new) has been spotted on GitHub that combines both a standard telnet scanner and also MIRAI. <\/p>\n<p>It has been uploaded here:<a href=\"https:\/\/github.com\/geo93033\/u\">https:\/\/github.com\/geo93033\/u<\/a>.<\/p>\n<p>In the header(s) you can find some credentials:<\/p>\n<blockquote><p>Xmpp: b1nary@nigge.rs<br \/>\nTwitter: @P2PBOTNET<br \/>\nInstragram: @Rebirth.c<br \/>\nSkype: b1narythag0d<\/p><\/blockquote>\n<p>and<\/p>\n<blockquote><p>\nSkype: uriede<br \/>\nXMPP: Crypt@nigge.rs<br \/>\nChanges:<br \/>\nMade Date: 7-30-16<\/p><\/blockquote>\n<p>And also a &#8220;nice&#8221; notice:<\/p>\n<blockquote><p>\/*<br \/>\nRebirth Is an ongoing project, that will have many builds, and updates.<br \/>\nThis Client is being constantly worked on.<br \/>\nAnyone that bought Rebirth Legitly will have access to the builds, and updates.<br \/>\nFor anyone that leeches, or leaks, well fuck you.<br \/>\n*\/<\/p><\/blockquote>\n<hr \/>\n<p>Besides that, you can also find several names of the ELF binaries used by this (or other) infections, as well as the architectures they are designed for:<\/p>\n<blockquote><p>\t&#8220;jackmymips&#8221;,<br \/>\n\t&#8220;jackmymips64&#8221;,<br \/>\n\t&#8220;jackmymipsel&#8221;,<br \/>\n\t&#8220;jackmysh2eb&#8221;,<br \/>\n\t&#8220;jackmysh2elf&#8221;,<br \/>\n\t&#8220;jackmysh4&#8221;,<br \/>\n\t&#8220;jackmyx86&#8221;,<br \/>\n\t&#8220;jackmyarmv5&#8221;,<br \/>\n\t&#8220;jackmyarmv4tl&#8221;,<br \/>\n\t&#8220;jackmyarmv4&#8221;,<br \/>\n\t&#8220;jackmyarmv6&#8221;,<br \/>\n\t&#8220;jackmyi686&#8221;,<br \/>\n\t&#8220;jackmypowerpc&#8221;,<br \/>\n\t&#8220;jackmypowerpc440fp&#8221;,<br \/>\n\t&#8220;jackmyi586&#8221;,<br \/>\n\t&#8220;jackmym68k&#8221;,<br \/>\n\t&#8220;jackmysparc&#8221;,<\/p><\/blockquote>\n<blockquote><p>\t&#8220;hackmymips&#8221;,<br \/>\n\t&#8220;hackmymipsel&#8221;,<br \/>\n\t&#8220;hackmysh4&#8221;,<br \/>\n\t&#8220;hackmyx86&#8221;,<br \/>\n\t&#8220;hackmyarmv6&#8221;,<br \/>\n\t&#8220;hackmyi686&#8221;,<br \/>\n\t&#8220;hackmypowerpc&#8221;,<br \/>\n\t&#8220;hackmyi586&#8221;,<br \/>\n\t&#8220;hackmym68k&#8221;,<br \/>\n\t&#8220;hackmysparc&#8221;,<\/p><\/blockquote>\n<blockquote><p>\t&#8220;busyboxterrorist&#8221;,<br \/>\n\t&#8220;DFhxdhdf&#8221;,<br \/>\n\t&#8220;dvrHelper&#8221;,<br \/>\n\t&#8220;FDFDHFC&#8221;,<br \/>\n\t&#8220;FEUB&#8221;,<br \/>\n\t&#8220;FTUdftui&#8221;,<br \/>\n\t&#8220;GHfjfgvj&#8221;,<\/p><\/blockquote>\n<blockquote><p>\t&#8220;jhUOH&#8221;,<br \/>\n\t&#8220;JIPJIPJj&#8221;,<br \/>\n\t&#8220;JIPJuipjh&#8221;,<br \/>\n\t&#8220;kmyx86_64&#8221;,    \/\/<- Kami?<\/p><\/blockquote>\n<blockquote><p>\t&#8220;TwoFacearmv61&#8221;,<br \/>\n\t&#8220;TwoFacei586&#8221;,<br \/>\n\t&#8220;TwoFacei686&#8221;,<br \/>\n\t&#8220;TwoFacem86k&#8221;,<br \/>\n\t&#8220;TwoFacemips&#8221;,<br \/>\n\t&#8220;TwoFacemipsel&#8221;,<br \/>\n\t&#8220;TwoFacepowerpc&#8221;,<br \/>\n\t&#8220;TwoFacesh4&#8221;,<br \/>\n\t&#8220;TwoFacesparc&#8221;,<br \/>\n\t&#8220;TwoFacex86_64&#8221;,<\/p><\/blockquote>\n<p>and others&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new strain (as long as December 2016 can be called new) has been spotted on GitHub that combines both a standard telnet scanner and also MIRAI. It has been uploaded here:https:\/\/github.com\/geo93033\/u. In the header(s) you can find some credentials: Xmpp: b1nary@nigge.rs Twitter: @P2PBOTNET Instragram: @Rebirth.c Skype: b1narythag0d and Skype: &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[98,932,947,99],"tags":[74,60,981],"class_list":["post-11208","post","type-post","status-publish","format-standard","hentry","category-iot-newsupdates","category-iot-security","category-it-security","category-it-security-newsupdates","tag-iot","tag-malware","tag-mirai"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"nl","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":false,"content":false,"excerpt":false},"de":{"title":false,"content":false,"excerpt":false},"es":{"title":false,"content":false,"excerpt":false},"fi":{"title":false,"content":false,"excerpt":false},"fr":{"title":false,"content":false,"excerpt":false},"it":{"title":false,"content":false,"excerpt":false},"hu":{"title":false,"content":false,"excerpt":false},"nl":{"title":false,"content":false,"excerpt":false},"no":{"title":false,"content":false,"excerpt":false},"pl":{"title":false,"content":false,"excerpt":false},"pt":{"title":false,"content":false,"excerpt":false},"ru":{"title":false,"content":false,"excerpt":false},"sv":{"title":false,"content":false,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/posts\/11208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/comments?post=11208"}],"version-history":[{"count":1,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/posts\/11208\/revisions"}],"predecessor-version":[{"id":11209,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/posts\/11208\/revisions\/11209"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/media?parent=11208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/categories?post=11208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/tags?post=11208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}