Last week, thanks to the Check Point web sensor network, our researchers discovered a new and massive IoT Botnet, ‘IoTroop’. Due to the urgency of this discovery, we quickly published our initial findings in order to alert the cyber security community. Since then, we have had time to digest and dissect the propagating malware and share our findings with you.
The main findings are:
• The entire attack infrastructure has been uncovered.
• We have observed 2 sets of different infrastructures:
o The main set of servers and samples focused on infection and propagation.
o A smaller and different set used for 2nd stage payloads.
• The attackers have quick and flexible control of infected device via LUA scripting.
• The malware authors and operators are operating out of China.
Throughout the research, we found numerous indications that the authors and operators of this IoT Botnet are operating out of China. Of course, all these indications can be forged. However the sheer volume of evidence as well as locations, still leads us to conclude that these indications are true to a very high degree of probability.
We can also reveal that part of the C&C infrastructure was previously registered under the email ‘[email protected]’. This same email address was also used to register domains belonging to a Chinese APT Group dubbed ‘The Black Vine’. This is not strong enough to attribute this new botnet to the same group; however it does provide leads for future research.
The Main Infrastructure
Based on a system multiple different servers, each with its own role to play in the reconnaissance, exploitation and delivery of the malware payload, the entire botnet propagation infrastructure has been uncovered. The diagram below illustrates an in-depth view of the requests made and the functions of each server.
Diagram of Malware Propagation Infrastructure
The IoTroop malware is the main sample used in the campaign and is deployed as a first stage payload. It shares an extensive code base with the leaked Mirai source code which can be found in several online resources. The main differences we observed are:
We have detected several variants of samples used by the IoTroop malware containing very slight differences but containing the exact same functionality. Generally, all variants can be divided into two major categories correlating with the attacked device’s architecture – MIPS variants and ARM variants.
Once IoTroop executes its payload onto an infected device, the initial steps of operation are equivalent to those taken by Mirai. These include:
However, from this point of the control flow the IoTroop malware begins to execute its own unique functionality:
The device`s MAC address is retrieved and stored by sending IOCTL 0x8927 to the eth0, br0, eth1 and eth2 devices.
If the device the malware is currently running on runs the GoAhead embedded web server, the following shell command lines are executed:
IoTroop kills any open telnet processes open using port TCP/23.
It then continues to scan the device’s memory for the existing strings that are used by other IoT malware. If any of these strings are found, the process containing them is killed.
Random IP’s are generated for the purpose of vulnerability scanning. The code responsible for generating the IP address is identical to Mirai’s code and is used to generate IP addresses with the following excluded subnet.
The malware conducts a set of vulnerability tests on each of the generated IP addresses. These tests locate vulnerabilities in any of the following devices and/or infrastructure:
The specific vulnerability scan traffic is the following:
GET /cgi-bin/user/Config.cgi?.cab&action=get&category=Account
Host: %d.%d.%d.%d (Host: %d.%d.%d.%d:%d) Connection: keep-alive |
Avtech |
GET /shell?echo+jaws+123456;cat+/proc/cpuinfo HTTP/1.1
Host: %d.%d.%d.%d (Host: %d.%d.%d.%d:%d) Connection: keep-alive |
JAWS Web Server |
“GET /upgrade_handle.php?cmd=writeuploaddir&uploaddir=%%27;ech
Host: %d.%d.%d.%d (Host: %d.%d.%d.%d:%d) Connection: keep-alive |
NetGear |
GET /board.cgi?cmd=cat%%20/etc/passwd HTTP/1.1
Host: %d.%d.%d.%d (Host: %d.%d.%d.%d:%d) Connection: keep-alive |
VACRON |
GET /system.ini?loginuse&loginpas HTTP/1.1
Host: %d.%d.%d.%d (Host: %d.%d.%d.%d:%d) Connection: keep-alive |
WIFICAM |
POST /command.php HTTP/1.1
Host: %d.%d.%d.%d Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: %d
cmd=cat%%20/var/passwd
|
DLINK DIR-600 |
GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&curpath=/&cu
rrentsetting.htm=1&cmd=echo+dgn+123456 HTTP/1.1 Host: %d.%d.%d.%d (Host: %d.%d.%d.%d:%d) Connection: keep-alive
|
NetGear DGN1000 |
POST /apply.cgi HTTP/1.1
Host: %d.%d.%d.%d (Host: %d.%d.%d.%d:%d) Connection: keep-alive
submit_button=Diagnostics&change_action=gozila_cgi&submit_typ e=start_ping&action=&commit=0&nowait=1&ping_ip=%%3b%%20AAA BBB|||%%20%%3b&ping_size=&ping_times=5&traceroute_ip=
|
Linksys |
POST /hedwig.cgi HTTP/1.1
Host: %d.%d.%d.%d (Host: %d.%d.%d.%d:%d) Connection: keep-alive Content-type: text/xml Cookie: uid=qDxppsreSd Content-Length: %d
<?xml version=’1.0′ encoding=’UTF-8′?><postxml><module><servi ce>../../../htdocs/webinc/getcfg/DEVICE.ACCOUNT.xml</service> </module></postxml> |
DLINK DIR-8 |
This is a sample of a PCAP taken from one of the vulnerability scans:
IoTroop’s C&C backend is composed of several components, each responsible for a unique purpose.
The reporting sever is used to collect a list of all devices who were found to be vulnerable by any of the infected devices.
Reporting servers are prefixed with the ‘f’ subdomain name. We were able to identify two active reporting servers at the time of our research:
Once a device has been found to be vulnerable, IoTroop sends its data to the reporting server in the following manner:
The following arguments are being used as part of this HTTP GET request:
Each of the infected devices constantly pulls for available commands from the controlling C&C server. At the time of the research we were able to identify two active control servers:
if a port exists and is equal to 80, than a string of the format “http://<ip><url_path>” is constructed, otherwise it sets it to be “http://<ip>:<port><url_path>”, using the values of “ip”, “port” and “path” as the data to place in the string.
If the name JSON value is a full path then the file will be downloaded and saved under this name. Otherwise it will be placed under the /tmp directory.
Before handling the constructed URL, the bot will attempt to kill all similar processes by name, issuing the command “killall <name>”, where the argument is taken from the aforementioned “name” key. Finally, the URL will be passed to a download function.
The download function will first check the status of the file using lstat to verify that it exists and is valid for subsequent reading action, following which the MD5 hash function will be applied on its contents.
Upon opening the file and reading it, a supposed reporting or logging string of the format “open:error\success” or “read:error\success” will be constructed depending on the status of each of the actions accordingly, however this string is never used, suggesting that the malware is still undergoing adjustments and is in a development phase.
The retrieved hash will be compared against one that is provided by the controller in the “md5” key, so as to verify that the version of the file on disk (if such indeed exists) differs from the one provided by the server.
If indeed the file versions differ, a new file will be generated with the permission “r-xrwxrwx” and a socket will be established to the destination server (containing the required file).
IoTroop will construct an HTTP GET request and write it to the socket, after which it will try to read its contents in chunks of 128 bytes (in the event the request succeeded). These will be written to the newly created file, and checked one more time against the MD5, provide by the controllers, to verify that the contents were retrieved properly.
To finalize communication, the bot will issue the string “FIN\n” to the controller.
The execution of the file will always follow a download. In such case, there are several options, depending on the value of the “runtype” and “runport” keys.
The former is checked for the existence of the “mysel” substring, which will cause the execution of the downloaded file with the same arguments as the current process. These will usually have the second argument set to be a device model, and the third argument as a TCP port. This kind of behavior may correspond to an event of software update to the bot, suggesting the possibility of it evolving further in the future.
In any other case, either the downloaded file is executed with the given “runtype” and “runport” as arguments, or only with “runtype”.
The latter scenario would correspond to an execution of an arbitrary module or plugin, which could well be the Slowloris DDoS utility (found on the build server), or any other application of the like. Either way, in order to spawn the new process, the command “/bin/sh sh -c <path_to_executable> <runtype> <runport>” will be used.
Throughout our research we found the following samples being used by the IoTroop malware at different stages of its control flow.
Name | Hash | Type | Arch | Details |
a | 522EF21132B734853307DDDAC6B5DFB9 | Backdoor | ARM | Small backdoor that listens on TCP 8888 for raw shell commands, and executes them on the infected device. |
m | 83883F1C6B5423F0CA13B4278B431656 | Backdoor | MIPS | |
bot | 03AC15C3CF698510AA928CB93175BF55 | Mirai | MIPS | Mirai botnet, with default config. Seems to be used for debugging |
s1 | 445EB00D8D5846886DEC7A36BF3FD829 | Slowloris | MIPS | DDoS Tool |
s2 | 711CD91EB920CC3C0F78AF275471E560 | Slowloris | MIPS | |
s4 | 9B2124E9BB5F4583DDA5388FC6EAFDC1 | Slowloris | MIPS | |
s5 | FFF2EADCA6C31BFCC69AF1419D5C793C | Slowloris | MIPS | |
s3 | 25960FD858AFB6FB6F49621A2DB8E8BC | Slowloris | MIPS | |
sa | 726D0626F66D5CACFEFF36ED954DAD70 | IoTroop | ARM | core of botnet, recruits new bots through vulnerability enumeration |
sm | 9AD8473148E994981454B3B04370D1EC | IoTroop | MIPS | core of botnet, recruits new bots through vulnerability enumeration |
server | 5A4E11C8D47F2868F4C0150DD4E18464 | Mini_Telnet | MIPS | basic C implementation of a telnet client & server
https://github.com/qixiaohu/mini_telnet |
xget | 6F91694106BB6D5AAA7A7EAC841141D9 | Dropper | ARM | IoTroop malware dropper, downloads and executes the IoTroop sample (sa). |
We have noticed another set of related samples and C&C servers, also mentioned in a post from Qihoo 360, seemingly used for second stage payload.
These samples can be downloaded and executed by the IoTroop malware from the Download server. The samples are described in the following table:
These samples communicate with a different set of C&C servers to report infection and download commands. These servers are hard coded inside the samples in the form of domain / IP address sometimes with different ports, depending on the exact sample.
Lua-Integrated Malware AnalysisAccording to data collected from one of the reporting servers, there were around 4700 unique device infections reported to this server, mostly from IP addresses in South Korea.
These samples are compiled statically with the Lua interpreter, and the LuaSocket library., integrating Lua execution support with flexible network functionality. Additionally it contains code from the Mirai source, compiled in Debug mode, which is evident due to the existence of debug strings in the code. However, the Mirai code doesn’t seem to be utilized by the sample we analyzed, with the exception of one debug sub-string referenced by the code, and this is probably due to compiler optimization.
The existence of multiple debug strings, verbose outputs and the general state of the infrastructure, leads us to believe that these samples are still in testing or initial deployment phase. It is also evident the developers have an understanding of Lua’s interpreter internals, due to their usage of the interpreter’s internal functions.
The core part of the sample’s main function can be seen below:
The malware uses Lua interpreter’s internal functions to initialize the Lua engine, load the LuaSocket libraries and define some custom Lua global variables, some of which the attackers later reference in their Lua code.
Afterwards a function is pushed to the Lua engine stack and then defined as “attack”. This is equivalent to defining a function called “attack” in a LUA script. This string “attack” is taken as a substring from a debug string from the Mirai source code (this is probably an amusing artifact due to compiler optimization):
The malware then utilizes internal Lua functions in order to execute the following Lua script, which is embedded as a string inside the malware:
This script communicates with the hard coded C&C addresses of the malware and is actually the main payload. It starts by reporting the infection details to the reporting C&C (bbk80.com) using the global variables previously defined.
It then enters an infinite loop where it downloads Lua scripts from the command C&C (cbk99.com) and executes them. It works by downloading the “run.lua” file (a Lua script) from the C&C and passing it as an argument to the “attack” function that was previously defined in main. The “attack” function serves as a custom “eval” function, executing the script in a forked child process:
The malware will print an error string in Chinese if loading and/or execution of the script fails for some reason:
Currently the existing “run.lua” script on the C&C server simply prints the string “Just Test”:
We can see another Lua script left on the webserver named “run.bak.txt”, which looks like a data collection / update script. An excerpt is shown below:
The attackers can easily update the script and easily instruct the botnet to perform any task. This powerful setup gives the attackers flexible and dynamic control of infected devices, allowing them to easily target anything with custom, updateable attack code, and alter the malware’s behavior without updating the binary itself.
Check Point IPS and Anti-Bot Blades provides full protection against this threat.
IPS Protections:
Vendor | Protection Name |
GoAhead | Wireless IP Camera (P2P) WIFICAM Cameras Information Disclosure |
Wireless IP Camera (P2P) WIFICAM Cameras Remote Code Execution | |
D-Link | D-Link 850L Router Remote Code Execution |
D-Link DIR800 Series Router Remote Code Execution | |
D-Link DIR800 Series Router Information Disclosure | |
D-Link 850L Router Remote Unauthenticated Information Disclosure | |
D-Link 850L Router Cookie Overflow Remote Code Execution | |
D-Link DIR-600/300 Router Unauthenticated Remote Command Execution | |
NETGEAR | Netgear DGN Unauthenticated Command Execution
Netgear ReadyNAS Remote Command Execution |
AVTECH | AVTECH Devices Multiple Vulnerabilities |
Vacron | Vacron NVR Remote Code Execution |
Linksys | Belkin Linksys E1500/E2500 Remote Command Execution |
Linux | Linux System Files Information Disclosure |
Anti-Bot protections
Anti-Bot blade blocks IOTroops malware communication.