Bash Dropper Tricks with Curl
2022-10-15 12:0:0 Author: www.archcloudlabs.com(查看原文) 阅读量:25 收藏

Today we’re going to look at a couple neat curl tricks I found in a recent bash dropper I was analyzing that resulted in surprisingly low VirusTotal detentions! As previously blogged about([1][2][3]), Arch Cloud Labs runs a handful of honeypots to collect attacker data to hone my skills in DFIR topics . While this was just another Cryptominer targeting an exposed docker socket, the initial dropper script used a neat trick with curl that I think was worth a quick write up.

malware_dropper.png

Curl & IPv4 Addresses

IPv4 addresses are typically represented as in dotted-quad notation such as “192.168.1.1”. However, IPv4 addresses can also be represented as an integers, or in hexadecimal representation. For example, Vultr has a handy calculator that can convert these addresses for us. Now, the neat thing here is curl understands any of these values. Instead of curling “127.0.0.1” we can curl “2130706433”. Standing up a simple http.server with a handy-dandy python -m http.server we can now execute this example practically. The contents below shows the output as we’d expect when curling a dotted-quad notation representation of an IPv4 address.

➜  ~ curl http://2130706433:8000  
➜  ~ curl -v http://2130706433:8000  # the -v shows the resolution from integer to IPv4 dotted-quad notation
*   Trying 127.0.0.1:8000...
* Connected to 127.0.0.1 (127.0.0.1) port 8000 (#0)
> GET / HTTP/1.1
> Host: 127.0.0.1:8000                                                                       
> User-Agent: curl/7.82.0         
> Accept: */*                             
>                                                                                            
* Mark bundle as not supporting multiuse
* HTTP 1.0, assume close after body
< HTTP/1.0 200 OK                       
< Server: SimpleHTTP/0.6 Python/3.10.7      
< Date: Sat, 15 Oct 2022 23:52:37 GMT       
< Content-type: text/html; charset=utf-8                                                     
< Content-Length: 2864          

The image below shows said technique being used in the dropper script. malware_curl_trick.png

So why would a malware author do this? My guess is to avoid YARA rules that would hit on IPv4 addresses within bash scripts.

Cryptominer + Auxillary Payloads

The Cryptominer itself is a statically compiled XMRig that’s dropped to disk with a file name of “[cmake]”. The bash dropper attempts to install a systemd service to establish persistence for the miner. The initial systemd service file created by the bash dropper is called “ext4.service” and created within /tmp/ before being renamed via the mv command to cmake.service. The image below shows the bash snippet that achieves this technique.

mal_systemd.png

The bash dropper also brings down libprocesshider, a popular way to generate shared objects for LD_PRELOAD hijacking. Interestingly enough, the libprocesshider is executed on the target machine iterating over three separate file names in order to generate three separate Shared Object files for LD_PRELOAD hijacking. The truncated image below shows the base64 libprocesshider utility being decoded, default values being replaced with sed, and then compiled and put into place. libproc.png

Finally, as another method of defense evasion and persistence the Open Source Diamorphine rootkit is attempted to be installed. I say “attempted” as there’s no check prior to execution of whether not the user is running as root. The previous function call that implemented the libprocesshider installation did perform a UID 0 check, but this was not carried over to the Diamorphine rootkit installation. This presents a detection opportunity for insmod to fail.

rootkit.png

Notably, a file called “/var/tmp/.psla” is checked to identify whether or not the host has already been compromised. This is a unique artifact that could be used to track this particular infection further in conjunction with the wallet address embedded within the Cryptominer. mal_persistence.png

Infrastructure

The miners connect to a mining-proxy running on “a-dog[.]top” domains. Pivoting on these domains in VirusTotal (free account) revealed scanning utilities being hosted. Securitytrails provides excellent historical DNS information, leading to the discovery of more sub-domains being hosted at Frantech solutions. Arch Cloud Labs previous blog posts have revealed other samples being hosted here.

malware-domains.png

IoCs

a5b6f5ba494039e5a9f0491b7f7455d1  ar.sh
1e2bb44cd88e4763db54993638472f62  cmake (xmrig)
effa14bdf6a0a4d3cfc310e113270c26  cronb.sh (initall dropper)
70673b9f8a0f1ff0dd3b81c87834366c  s.sh
efaf221007ab206179ed1bfc6bc3ff72  diamorphine.c
0a25a018d23695f6005c7eef33f9255d  diamorphine.h
lova[.]a-dog[.]top
touch[.]a-dog[.]top
42xsBsC6dkv9PATLTkDjinUagUJLL33LYXTTi6LCxSuCinE86GXDbhgXRsqqjuwbgQKpKzhzkCYFZHjENSavKgd3LRpvU2f # wallet address

Beyond The Blog

This was just a quick look at a dropper for a Cryptomining campaign targeting exposed Docker sockets. There’s plenty of analysis to be done on the infrastructure and additional bash scripts VirusTotal has revealed. I hope by taking a quick look at this you’re inspired to run a few honeypots, collect some data and write up a blog yourself.


文章来源: https://www.archcloudlabs.com/projects/bash_dropper_tricks/
如有侵权请联系:admin#unsafe.sh