linux malware analysis blog

This research is a joint effort between Joakim Kennedy, Security Researcher at Intezer, and the BlackBerry Research & Intelligence Team. using trusted SSH public key authentication: ssh -oBatchMode=yes -oConnectTimeout=5 -oPasswordAuthentication=no -oPubkeyAuthentication=yes -oStrictHostKeyChecking=no -l root, The TOR connection is established through a SOCKS5 proxy connection to one of the IPs resolved from the, The main DreamBus spreader module will use one of these TOR proxies to send an HTTP request to the path, The main spreader module also has a function named, as a fallback) to send an HTTP request to a hardcoded TOR domain with the path, In another shell script, DreamBus defines a function called, The SSH bruteforce module is delivered as a shell script that contains commands to download and extract a tar archive file named, used by DreamBus to scan for SSH servers on the local network, Usage: sshpass address port username dict_file [threads=100], All second-stage DreamBus plugins, including the SSH bruteforce module, create a lock file named, The script attempts to move laterally within a private internal network by first enumerating the systems network adapters and searching for regexes that loosely match RFC 1918 IP address ranges. The heart of the toolkit is the REMnux Linux distribution based on. AvosLocker is a ransomware group that was identified in 2021, specifically targeting Windows machines. This DreamBus module exploits a remote code execution vulnerability in Apache Spark when run in, and the Master REST URL is accessible. { The first method involves hooking fopen and fopen64. However, at least one variant of the DreamBus. "restricted": true The few Linux sandboxes out thereLimon, detux, and LiSarequire creating a sandbox instance and arent actively maintained. In all cases, the filtering operates on both inbound and outbound traffic from the machine, to hide both directions of the traffic. Organizations should also deploy network and endpoint monitoring systems to identify compromises and be mindful of systems that engage in bruteforce attacks, which are typically very noisy. The subsequent two lines will create cron jobs that will be executed every minute to download and execute a shell command specified by the server and run as the root user. A flexible, stable operating system to support hybrid cloud innovation. Offer details. Figure 4 below shows a timeline of these events. What is Cloud Access Security Broker (CASB)? The SSH bruteforce module is delivered as a shell script that contains commands to download and extract a tar archive file named sshd into the directory /tmp/.X11-unix/sshd. Also starting in February of 2022, the name servers for the domain caixa[. "host": "127.0.0.1", Linux is practically everywhere but low Linux threat detection is pervasive across the antivirus industry, encouraging attackers to target this operating system aggressively in recent years. Some components of the botnet have been analyzed in the. At the time of publication, Zscaler ThreatLabZ has observed modules designed to spread through SSH, PostgreSQL, Redis, Hadoop YARN, Apache Spark, HashiCorp Consul, and SaltStack. "tls": false, The function then attempts to use the yum and apt package managers to install and enable the cron service, and uninstall aegis and qcloud. Transform your organization with 100% cloud native services, Propel your business with zero trust solutions that secure and connect your resources. Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Another is a Network Detection and Response (NDR), that can recognize network-based evidence of attacks and block the malware before it can take hold of its target. Once the system command has exited, Symbiote also exits the process, to prevent the original process from executing. Symbiote is very stealthy. Mirai is a DDoS botnet whose source code was released to the wild and many botnets variants are now based on this code. If it finds a match, the malware ignores the packet and increments a counter. The newly compromised system will concatenate and append each value with an underscore and send an HTTP request over TOR with the result in the referrer field. Experience the Worlds Largest Security Cloud. These attackers have a distinct advantage as their malicious activities are immediately turned into (cyber) cash without the need to interact with the victims at all. Figure 5: Intezer analysis of a Symbiote sample showing only genes classified as Symbiote. We have aptly named this malware Symbiote. Analysts can use it to investigate malware without having to find, install, and configure the tools. Coming Up The research team discovered more than 14,000 active Cobalt Strike Team Servers on the Internet since February 2020. Once extracted, there are three components, as shown in Table 3. "enabled": true, The XMRig configuration specifies a mining pool to use the infected systems CPU to mine Monero cryptocurrency. "astrobwt-max-size": 550, and featured videos. Trojans are a kind of malware. The most common types of Linux malware. Symbiote appears to be designed for both credential stealing and to provide remote access to infected Linux servers. These include properly securing all applications that are both publicly and privately accessible. Run the REMnux distro as a Docker container. Symbiote is not the first Linux malware to use BPF. DreamBus will also download the socket statistics ss utility if it is not available. The functions of Loader Script are as follows: "donate-level": 5, Malware Reverse Engineering for Beginners - Part 2 In part 1 of this series, we warmed up and aligned with basic computing terminologies.. The data is hex encoded and chunked up to be exfiltrated via DNS address (A) record requests to a domain name controlled by the threat actor. If the malware finds a port its searching for on a line its scanning, it skips to the next line. KongHungaryIcelandIndiaIndonesiaIran, Islamic Republic ofIraqIrelandIsraelItalyIvory CoastJamaicaJapanJordanKazakhstanKenyaKiribatiKorea, Democratic DreamBus scanning behavior for public and private networks. It will also attempt to delete the files /etc/cron.d/tmp00 and /tmp/.systemd-salt. It can be difficult to source ELF binaries and various kinds of linux malware samples, but rest assured we are up to the challenge. ]link and ns2[.]cintepol[. A few months back, we discovered a new, undetected malware that acts in this parasitic nature affecting Linux operating systems. Cybercriminals primarily use two approaches here: a wallet-stealing functionality in malware, sometimes posing as crypto-based apps, or monetizing stolen CPU cycles to successfully mine cryptocurrencies, an attack known as cryptojacking. If the expected response condition is met, the DreamBus module will then attempt to remove a service named systemd-service by sending the following HTTP PUT request to the Consul API: After attempting to remove the service, the DreamBus Consul module will attempt to register a service with the same name as shown below: This registration command will register a service named systemd-service that executes Base64-encoded shell commands. Once it has infected all the running processes, it provides the threat actor with rootkit functionality, the ability to harvest credentials, and remote access capability. , which incorporates many tools that malware analysts use to: Examine static properties of a suspicious file. Zscalers ThreatLabZ research team recently analyzed a Linux-based malware family that we have dubbed the DreamBus Botnet. These rules are valid on unpacked DreamBus binaries. The quality of . The following Linux threats are just some of the examples that have been documented by the research community: #Dacls #RAT, the first #Lazarus #malware that targets #Linux deviceshttps://t.co/1Pz7DcxOlU#securityaffairs #hacking , Security Affairs (@securityaffairs) December 18, 2019, [1/3] Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded into all running processes using LD_PRELOAD (T1574.006), and parasitically infects the machine. If the password provided is a match, the hooked function returns a success response. The Symbiote malware, in addition to hiding its own presence on the machine, also hides other files related to malware likely deployed with it. To understand why, its worth looking at the manual page for ldd: In the usual case, ldd invokes the standard dynamic linker (see ld.so(8)) with the LD_TRACE_LOADED_OBJECTS environment variable set to 1. It was compiled on 2022-03-23, according . module scans all internet ranges between 1.0.0.0/8 222.0.0.0/8 on ports 5432 and 5433. Updates and new commands are issued that typically start around 6:00 a.m. UTC or 9:00 a.m. Moscow Standard Time (MSK) and end approximately at 3:00 p.m. UTC or 6:00 p.m. MSK. Intezer Contribution to IBM X-Force Cloud Threat Landscape Report, Best Practices for Securing a Docker Runtime Environment, ManusCrypt RAT tied to Lazarus group. a0cd554c35dee3fed3d1607dc18debd1296fa aee29b5bd77ff83ab6956a6f9d6, 45eacba032367db7f3b031e5d9df10b30d016 64f24da6847322f6af1fd8e7f01. In part 1 of this series, we warmed up and aligned with basic computing On 21 July, 2022, we released a blog post about a new malware called New: Connect Microsoft Defender with Intezer's Autonomous SOC solution, 5 Key Factors for Selecting a Managed Detection and Response (MDR) Provider, Endpoint Forensics and Memory Analysis, Simplified, Phishing Campaign Targets Chinese Nuclear Energy Industry, How Hackers Use Binary Padding to Outsmart Sandboxes and Infiltrate Your Systems, Malware Reverse Engineering for Beginners Part 2, Detection Rules for Lightning Framework (and How to Make Them With Osquery), effectiveness of code reuse analysis vs. signature-based detection for detecting this malware. DreamBus and its modules predominantly use cURL for network communications and set the HTTP user agent string to a hyphen (-) character. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. SSMA can analyze ELF and PE and analyze its structure. An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others. "print-time": 60, This allows it to be loaded before any other shared objects. DreamBus is designed to be portable across a range of Unix and Linux-based operating systems. The modules are very similar, all with the goal of achieving remote code execution via a misconfigured Redis installation that either does not require a password or has a weak password. By using all three of these methods, the malware ensures that all traffic is hidden. We have aptly named this malware Symbiote. Exposing Malware in Linux-Based Multi-Cloud Environments, a new report conducted by the VMware Threat Analysis Unit, takes a comprehensive look at these types of attacks often leveraged by the adversary once inside: executing ransomware, deploying cryptomining components and RATs. Most of the modules scan the ranges listed in the DreamBus Scanning Behavior section of this report. Here's a list of the top ten Linux scanning tools to check your server for security flaws and malware. If an ssh or scp process is calling the function, it captures the credentials. (The linux-vdso and ld-linux shared dependencies are special; see vdso(7) and ld.so(8).). Find programs, certifications, and events, Get research and insights at your fingertips, See solutions for your industry and country, Discover how it began and where its going, Meet our partners and explore system integrators and technology alliances, Explore best-in-class partner integrations to help you accelerate digital transformation, See news, stock information, and quarterly reports, Find everything you need to cover Zscaler, Understand our adherence to rigorous standards. "http": { to be enabled on the server. "nicehash": true, You can get into this field by building upon your existing skills in any of these disciplines. "event" : "request-pricing-submission", }, Search for: Search. data-mining weka elf malware-analysis linux-malware malware-detection Updated Jan 6, 2019; . The Challenge with ELF File Analysis Shellbot malware is still widespread. The pnscan tool ss is then used to scan the internal subnets for online SSH servers and saved to a file named ip. Were the worlds leading provider of enterprise open source solutionsincluding Linux, cloud, container, and Kubernetes. The malware name is derived from the prefix of the TOR domain dreambusweduybcp[. Otherwise, the module scans RFC 1918 private subnets and the internet ranges previously mentioned on port 8088. Next, two shell commands attempt to install the Python packages: . Its no secret that in recent years, cryptocurrencies have caught the eye of sophisticated cryptominers. "yield": true, "tls-fingerprint": null, Malware on Linux servers and machines can cause data loss and financial damage. "cn/0": false, The Linux threat landscape is heavily concentrated with DDoS botnets and crypto-miners. Therefore, it scans systems that are on a local intranet as well as the internet. When the shared object is first loaded, it checks for the environment variable HTTP_SETTHIS. "user-agent": null, If this string is returned by the server, the Redis module will then send an AUTH command with a password chosen from a hardcoded dictionary, which has approximately 28,930 entries. Avigayil is a product manager at Intezer, leading Intezer Analyze product lifecycle. REMnux: A Linux Toolkit for Malware Analysis. The third method Symbiote uses to hide its network traffic is to hook libpcap functions. If the password is able to be guessed, the Redis module sends the following commands: Another version of the Redis module exploits systems that do not require authentication. "self-select": null ]onion that has been used for C&C communications since July 2019. 2023 Zscaler, Inc. All rights reserved. If the calling application is not trying to access something under /proc, the malware instead scrubs the result from a file list. All versions of the DreamBus PostgreSQL modules spread by scanning the RFC 1918 private networks for, servers running on port 5432. Bug Bounty Toolkit; Forum; Menu. Redis is a popular open source data store that is used as a database, cache, and message broker. "keepalive": true, In fact, these attacks have become so increasingly popular that even non-technical cybercriminals are able to execute these attacks successfully. Next - Install the Distro. During her time at Intezer, she has uncovered and documented different malware targeting both Linux and Windows platforms. The request uses cURL (or wget as a fallback) to send an HTTP request to a hardcoded TOR domain with the path /bot. . There are many undiscovered threats on this operating system and we expect more threats will be exposed over time as Linux continues to gain in popularity. by querying the following domains: The function x() is used to establish persistence by creating a cron job that runs once per hour with the starting minute determined randomly between 0-58. High-level diagram of the DreamBus botnet architecture, Since not all compromised systems have TOR installed, DreamBus will use a proxy service such as tor2web to translate requests between TOR and the internet (described in more detail later in this analysis). Explore network interactions for behavioral analysis. Malware Analysis. privately accessible. Currently, there arent enough companies hunting for and publishing IOCs and other information about the latest Linux threats. Thats one of the reasons why its important to add analyzing ELF files to your skillset. After that, it scans each line for the presence of specific ports. "background": true, Monero cryptocurrency (XMR) is the most popular illicitly mined digital coin of rising cryptojacking attacks on Linux-based systems. "colors": true, [snip] }, The content consists of a number of shell commands that will first kill competing malware such as kinsing. Along with sending the request to the domain name, Symbiote also sends it as a UDP broadcast. The success of DreamBus is dependent on spreading to as many systems as possible. We discuss several pressing security issues including malware and vulnerabilities that compromise Linux systems in the first half of 2021. This site uses JavaScript to provide a number of functions, to use this site please enable JavaScript in your browser. Depending on the DreamBus Redis module version, the malware scans RFC 1918 private subnets on ports 6379, 7000, and 7001 and the internet ranges mentioned before. Now a new variant of AvosLocker malware is also targeting Linux environments. The third command launches the exploit script with the port, a command to execute (with the -c option), a flag to run the command on all active minions (with the -m option), and the IP address of the SaltStack server. "id": null, The BlackBerry Research & Intelligence team examines emerging and persistent threats, providing intelligence analysis for the benefit of defenders and the organizations they serve. BlackArch Linux; Kali Linux; Malware Analysis; Bug Bounty. Malware detection supports RHEL 7 Server / Workstation and RHEL 8 and 9 hosts. Today, there is a need to analyze Linux malwares in an automated way to understand its capabilities. Analysts can use it to investigate malware without having to find, install, and configure the tools. Aside from giving a high-level overview of the security issues and threats . The tool can perform a set of tests against a malware sample and retrieve metadata from it. The main DreamBus spreader module will use one of these TOR proxies to send an HTTP request to the path /int., where the architecture is determined by the command line uname -m. The response to this request is typically either the DreamBus spreader module or a series of shell commands to execute that is dependent on the system architecture. All other users must first be given access to the service, as detailed in section 2.2. of the Insights malware detection guide. The script attempts to move laterally within a private internal network by first enumerating the systems network adapters and searching for regexes that loosely match RFC 1918 IP address ranges. This malware was reported mainly targeting Windows. This causes the dynamic linker to inspect the program's dynamic dependencies, and find (according to the rules described in ld.so(8)) and load the objects that satisfy those dependencies. The current monetization vector for DreamBus is through mining a cryptocurrency known as Monero (XMR), which is a popular alternative to Bitcoin due to its improvements in anonymity. The symbiosis can be mutually beneficial to both organisms, but sometimes it can be parasitic when one benefits and the other is harmed. Most of the modules scan the ranges listed in the DreamBus Scanning Behavior section of this report. The subsequent commands contain shell commands similar to the main module that will attempt to download cURL if it is not available, resolve DNS over HTTP for a TOR relay, and connect to a hardcoded TOR domain to pull down the main module of DreamBus on the newly infected system via an HTTP request path such as /pg. or /pgl. that depends on the module version. In part 1 of this series, we warmed up and aligned with basic computing terminologies. On 21 July, 2022, we released a blog post about a new malware called Lightning What is binary padding? The malware detection service is a monitoring and assessment tool that scans Red Hat Enterprise Linux (RHEL) systems for the presence of malware, utilizing over 175 signatures of known Linux malware provided in partnership with the IBM X-Force Threat Intelligence team. The differences between the two commands are that the first command writes the content of the file x.px to /tmp.systemd-salt, while the second command writes the content of the file x.pa to /etc/cron.d/tmp00. Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com A number of devices are running Linux due to its flexibility and open source nature. Dr. Joakim Kennedy is a Security Researcher analyzing malware and tracking threat actors on a daily basis. This report analyzes seven cryptominer families. It uses three different methods to accomplish this. Introduction To Malware Analysis. Some of the malware families we see on a regular basis and include in a daily archive include categories like . These include vulnerabilities, misconfigurations and security gaps, and malware. "retry-pause": 5, The malware is designed to be loaded by the linker via the LD_PRELOAD directive. He brings 20+ years of experience with delivering and supporting technology solutions to users in a variety of industries, including Information Technology, Talent Acquisition and Residential Management. Since it is extremely evasive, a Symbiote infection is likely to fly under the radar. In our research, we havent found enough evidence to determine whether Symbiote is being used in highly targeted or broad attacks. To make the analysis easier he has written the Go Reverse Engineering Toolkit (github.com/goretk), an open-source toolkit for analysis of Go binaries. When it comes to protecting multi-cloud environments, it starts with complete visibility into all workloads with detailed system context that makes it easier to understand and prioritize mitigation efforts. The Linux kernel uses extended Berkeley Packet Filter (eBPF) to allow packet filtering based on rules provided from a userland process. At the time of publication, the value of Monero is up over 100 percent in the past year, further increasing the threat actors profits. these types of attacks often leveraged by the adversary once inside: executing ransomware, deploying cryptomining components and RATs. The DreamBus malware exhibits worm-like behavior that is highly effective in spreading due its multifaceted approach to propagating itself across the internet and laterally through an internal network using a variety of methods. The DreamBus module performs an initial check to make sure that /usr/bin/curl and /usr/bin/python3 exist on the system and are executable. The bytecode drops if they match the following conditions: While this bytecode only drops packets based on ports, we have also observed filtering of traffic based on IPv4 addresses. Many regard Linux as a unique operating system because of its stability, flexibility, and open-source nature. of the most popular websites. "rig-id": null, These three Symbiote samples were uploaded by the same submitter from Brazil. The XMRig module is compiled regularly with the most recent version, XMRig 6.7.1, built on January 15, 2021. This means a malwares entry point to the system has to be much more targeted. Once the attackers have obtained a foothold in their target cloud environment, they often look to perform two types of attacks: execute ransomware or deploy cryptomining components. Zscalers multilayered cloud security platform detects indicators at various levels, as shown below: The following IOCs can be used to detect a DreamBus infection. "priority": null, Zscalers ThreatLabZ research team recently analyzed a Linux-based malware family that we have dubbed the, , which consists of a series of Executable and Linkable Format (ELF) binaries and Unix shell scripts. This logic is used in all hooked functions. This script performs a variety of actions. The module exploits CVE-2020-11651, which is an authentication bypass that results in full remote command execution as root. VMware Threat Analysis Unit explains that a solid defense includes fighting back with a combination of approaches, mechanisms, and policies. At the time of publication, Zscaler ThreatLabZ has observed modules designed to spread through SSH, PostgreSQL, Redis, Hadoop YARN, Apache Spark, HashiCorp Consul, and SaltStack. Its not only new and sophisticated Linux malware which remain fully undetected by security vendors, but also common ones. In biology, a symbiote is an organism that lives in symbiosis with another organism. Figure 1. The malware detection service is a monitoring and assessment tool that scans Red Hat Enterprise Linux (RHEL) systems for the presence of malware, utilizing over 175 signatures of known Linux malware provided in partnership with the IBM X-Force Threat Intelligence team. The VMware Threat Analysis Unit (TAU) is composed of some of the leading minds in cybersecurity research. Volatility - Memory forensics analysis framework. In addition, we believe the Amnesia malware is the first Linux malware to adopt virtual machine evasion techniques to defeat malware analysis sandboxes. Be careful! When the shell command is decoded and executed, it will download the main DreamBus spreader module using the path, . The internet is full of information about PE file analysis and there are also various easy-to-use tools and tutorials. Perform memory forensics of an infected system. "syslog": false, If you want to learn more about why traditional solutions do not detect ELF properly, check out this webinar profiling the Linux threat landscape. . mt64_.so. Missing credential exfiltration over DNS. }, [snip] Information from all sources must be combined in an intelligent fashion that adds value, while enabling the sharing of this contextual data across teams to reduce silos. Cryptocurrency-mining malware is still a prevalent threat, as illustrated by our detections of this threat in the first half of 2019.Cybercriminals, too, increasingly explored new platforms and ways to further cash in on their malware from mobile devices and Unix and Unix-like systems to servers and cloud environments.. If this string is found, the Redis module sends the following commands: Both attacks set the current directory to /etc/cron.d/ and create a file named systemdd within this directory through the dbfilename variable. "kawpow": false In 2014, ESET released an in-depth analysis of Ebury, an OpenSSH backdoor that also performs credential stealing. (0x21585055) are typically replaced with non-ASCII values. Core of LiSa project supports 4 basic modules of analysis: static_analysis, dynamic_analysis, network_analysis and virustotal. Zscaler is universally recognized as the leader in zero trust. The Linux Threat Landscape Lenny Zeltser. These include properly securing all applications that are both publicly. The first sends an HTTP POST request to the target server as shown below using wget: The response is parsed for the application ID and stored in the app_idvariable, which is required in the next request. Symbiote is a malware that is highly evasive. Finally, the files e.py (the Python-based exploit script), x.pa (the temporary cron job), x.pe (the main Base64 encoded shell script), and x.px (main spreader module script) are deleted to hide the exploitation. Malicious actors have taken notice and are increasingly targeting vulnerable Linux-based systems in multi-cloud environments to infiltrate corporate and government networks. Some of the file names match those used by Symbiote, while others match names of files suspected to be tools used by the threat actor on the infected machine. Researchers have disclosed highly sophisticated ELF malware, proving attackers are increasingly adding Linux malware to their arsenal. Varonis named a Leader in The Forrester Wave: Data Security Platforms, Q1 2023 Read the report Platform This command exploits a disputed vulnerability CVE-2019-9193 that allows users with pg_execute_server_program privileges to execute arbitrary code. Latest stories. "huge-pages-jit": false, The main threats in most multi-cloud environments are ransomware, cryptojacking, and remote access tools.

Mobile Phones For Seniors Australia Unlocked, Oak Park Studio Apartments For Rent, Rustoleum Chalked Blue, Member's Mark 3-tier Foldable Rolling Cart, Articles L

linux malware analysis blogLeave a Reply

This site uses Akismet to reduce spam. benefits of architecture vision.