Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

This report is jointly released by the National Internet Emergency Center (CNCERT) and Qihoo 360 Technology Co., Ltd. (Qihoo 360).

1

Overview

Recently, CNCERT and Qihoo 360 have jointly monitored the emergence of a new DDoS botnet that is rapidly spreading on the internet. Tracking and monitoring have revealed that the number of domestic compromised hosts (measured by IP count) has exceeded 20,000 daily, and it targets multiple attack objectives each day, posing a significant threat to cyberspace. This botnet is a variant of Mirai, including samples targeting CPU architectures such as mips, arm, and x86. Over the past two months, we have captured at least four iterations of this Mirai variant, with communication protocols largely consistent with Mirai. The primary propagation method is currently Telnet password brute-forcing, although it has historically exploited N-day vulnerabilities for propagation.

2

Botnet Analysis

(1) Sample Analysis

This article selects the latest V4 sample for the X86 CPU architecture as the main analysis object, with the basic information of the sample as follows.

File Name gx86
MD5 02d163134e3b4eabe62497b81659c2db
File Format ELF 32-bit LSB executable, Intel 80386
C2 103.136.42.158:16100

1. The sample must run with the filename: GSec; otherwise, it will terminate the process and print a misleading statement.

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Figure 1 Sample Running Information

2. This sample reuses some code from the Gafgyt family, modifying the process name based on whether the target machine has Python installed.

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Figure 2 Process Name Modification

3. The bot’s online mechanism is consistent with Mirai. The first packet is a fixed four bytes \x00\x00\x00\x01, the second packet is the sample running parameter length + running parameters, defaulting to \x00, generally specified in shell scripts, followed by sending a fixed two-byte heartbeat packet \x00\x00 every 60 seconds.

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Figure 3 Online Mechanism

4. DDoS Attack MethodsInclude attacks targeting Layer 4 and Layer 7, including typical Mirai DDoS attack methods.Table 1 Attack Method Description

Attack Method Name Meaning Characteristics
gudp Modified UDP FLOOD, Layer 4 High BPS
ovh_bypass UDP-based Layer 7 attack Targets OVH-protected servers
greeth Based on GRE protocol, effective attack payload at Layer 2 High BPS
plaintcp Modified TCP FLOOD, Layer 4 High BPS
greip Modified greeth FLOOD High BPS, PPS
std Modified UDP FLOOD High BPS

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Figure 4 Attack Methods

(2) Propagation Method Analysis

In the changes from version V1 to V4 of this Mirai variant botnet, the propagation model has completely removed the vulnerability propagation module, and there are multiple versions of the weak password list. It can be inferred that the botnet controllers believe that password brute-forcing is more effective, thus favoring this propagation method.

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

The content of the password decryption for each version is shown in Figure 5.

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Figure 5 Passwords for Each Version

3

Botnet Infection Scale

Through monitoring and analysis, it was found that from April 1 to May 23, 2022, the number of daily online compromised hosts for this Mirai variant botnet reached a maximum of 21,000, with a cumulative infection count of 112,000. The daily situation of online compromised hosts is as follows.

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Figure 6 Daily Online Compromised Hosts

This Mirai variant botnet is distributed among compromised hosts by province, with the top three being Zhejiang Province (45.1%), Yunnan Province (16.1%), and Guangdong Province (10.7%); by operator, Telecom accounts for 93.2%, Unicom 6.1%, and Mobile 0.4%.

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Figure 7 Distribution of Compromised Hosts by Province and Operator

4

Botnet Attack Dynamics

Through tracking and monitoring, it was found that this Mirai variant botnet has been launching DDoS attacks since April 1, 2022, and the attack behavior has been very active. The most intense attacks occurred on May 16, 2022, with a total of 47 DDoS attacks, and on May 8, 2022, it mobilized 16,000 hosts to attack a specific target. The trend of attack events is as follows:

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Figure 8 Attack Trend of Mirai Variant Botnet

5

Prevention Recommendations

We urge the public to strengthen risk awareness and enhance security measures to avoid unnecessary economic losses. The main recommendations include: 1. Timely patching of relevant system vulnerabilities. 2. Avoid using weak or default passwords, and change passwords regularly.

Upon discovering that a host is infected with a botnet program, immediately verify the control status of the host and the intrusion path, and clean the affected host.

6

Related IOC

Sample MD5:

79b5152e07ac9f67f337553afd8fdf49

73963353779b44bce2891d11e66d0e91

4cb48ee8d5e948cfe90eb1a9a3b5111f

17659ffa9ba80830b2ec6a7e1601fd38

0c05bcb28832937369e39ee113a6be81

c6ad4c67d5b8c4b2730a187161008da3

70efbb538061fbc2c399f2437a6e0e06

ba8ccfb46737d33e3eceec65d5ea17dd

5704172e740810bd7a808d17a62a2b63

1b469287783dc5f83222c515576653f5

4c160ae988d2489b9f1c27914c1657bf

9ee59e00d14bf71c0e2f1e09c9469dd6

d9e9923f705b6a3bce4bf4ddbb9ab2ec

a9f1e01e6793af26162bfe13f134a285

41dc20f7d94d11d8fceb524ff6b2391f

Download Links:

http[:]//5.255.101.44/garm

http[:]//5.255.101.44/garm5

http[:]//5.255.101.44/garm6

http[:]//5.255.101.44/garm7

http[:]//5.255.101.44/gmpsl

http[:]//5.255.101.44/gm68k

http[:]//5.255.101.44/gsh4

http[:]//5.255.101.44/gppc

http[:]//5.255.101.44/gx86

http[:]//5.255.101.44/gmips

http[:]//103.136.41.159/garm

http[:]//103.136.41.159/garm5

http[:]//103.136.41.159/garm6

http[:]//103.136.41.159/garm7

http[:]//103.136.41.159/gmpsl

http[:]//103.136.41.159/gm68k

http[:]//103.136.41.159/gsh4

http[:]//103.136.41.159/gppc

http[:]//103.136.41.159/gx86

http[:]//103.136.41.159/gmips

http[:]//194.31.98.230/garm

http[:]//194.31.98.230/garm5

http[:]//194.31.98.230/garm6

http[:]//194.31.98.230/garm7

http[:]//194.31.98.230/gmpsl

http[:]//194.31.98.230/gm68k

http[:]//194.31.98.230/gsh4

http[:]//194.31.98.230/gppc

http[:]//194.31.98.230/gx86

http[:]//194.31.98.230/gmips

http[:]//194.31.98.186/garm

http[:]//194.31.98.186/garm5

http[:]//194.31.98.186/garm6

http[:]//194.31.98.186/garm7

http[:]//194.31.98.186/gmpsl

http[:]//194.31.98.186/gm68k

http[:]//194.31.98.186/gsh4

http[:]//194.31.98.186/gppc

http[:]//194.31.98.186/gx86

http[:]//194.31.98.186/gmips

http[:]//107.174.137.24/garm

http[:]//107.174.137.24/garm5

http[:]//107.174.137.24/garm6

http[:]//107.174.137.24/garm7

http[:]//107.174.137.24/gmpsl

http[:]//107.174.137.24/gm68k

http[:]//107.174.137.24/gsh4

http[:]//107.174.137.24/gppc

http[:]//107.174.137.24/gx86

http[:]//107.174.137.24/gmips

Control IP:

46.175.146.159

103.136.42.158

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Click “Read Original” below to enter the official website for the complete report download.

Leave a Comment