Skip to content

Commit

Permalink
fix AI chat update readme and add Log4Shell Exploitation Attempt from…
Browse files Browse the repository at this point in the history
… Poland-based IPs Seeking Unauthorized Access for Cryptojacking and Potential Botnet Propagation
  • Loading branch information
Lucas Faudman authored and Lucas Faudman committed Feb 6, 2024
1 parent 2204668 commit 04c00a1
Show file tree
Hide file tree
Showing 2 changed files with 31 additions and 102 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -739,25 +739,27 @@ In summary, the HTTP requests are facilitating the attack vector, triggering the

# Malware OSINT

Based on the analysis using data from MalwareBazaar, ThreatFox, URLhaus, and Malpedia, the following is known about the hosts, malware, and exploits used in the attack:
Upon analyzing the data from MalwareBazaar, ThreatFox, URLhaus, and Malpedia, as well as the src_ips, malware hashes, and URLs or hosts found in the malware samples, commands, and HTTP requests associated with the attack, we can summarize the following points:

1. **Source IPs**: The attack originated from two IP addresses: `95.214.53.103` and `95.214.53.99`.
**Source IPs:**
- `95.214.53.103`
- `95.214.53.99`
These source IPs were both involved in the attack and have been reported as part of malicious activities.

2. **Hosts**: The host `141.147.74.15` was identified as a source from which the attacker attempted to download a binary named `paraiso.x86`. URLhaus has reported this host serving various payloads, and it's been identified in association with multiple URLs as shown in the URLhaus data.
**Hosts used in the attack:**
- `raw.githubusercontent.com` from which the crypto miner setup script was downloaded.
- `141.147.74.15` which was used to serve different variants of the malware.

3. **Associated URLs**:
- http://141.147.74.15/system32/paraiso.sh4
- http://141.147.74.15/system32/paraiso.arm5
- http://141.147.74.15/system32/paraiso.arm
- http://141.147.74.15/system32/paraiso.ppc
- http://141.147.74.15/system32/paraiso.x86
- https://raw.githubusercontent.com/C3Pool/xmrig_setup/master/setup_c3pool_miner.sh
**Malware Exploits:**
- The `Log4Shell` vulnerability (CVE-2021-44228) was exploited as a vector to conduct the attack.

4. **Malware**: The Mirai botnet variant (`elf.mirai`) was identified in the context of the hosts and associated URLs. Mirai is a well-known botnet primarily targeting networked devices running Linux. Also, a cryptocurrency miner (XMRig) setup script was fetched from a URL associated with GitHub. This indicates potential cryptomining activity on exploited systems.
**URLs and Malware Distribution:**
- From URLhaus, the host `141.147.74.15` was serving various files such as `paraiso.sh4`, `paraiso.arm5`, `paraiso.arm`, `paraiso.ppc`, and `paraiso.x86`. These files are related to the Mirai botnet, as reflected in the tags ('mirai', '32', 'elf', etc.) and are identified on URLhaus as being involved in malware distribution.
- Further analysis from Malpedia describes "elf.mirai" as a significant botnet targeting vulnerable networked devices running Linux. The botnet has been known for its ability to infect many devices and become one of the largest sources of DDoS attacks.

The exploitation involved an encoded attack sequence leveraging the Log4j vulnerability (CVE-2021-44228, "Log4Shell"), and the exploitation resulted in successful command execution. The attack pattern suggests that the attacker employed a 'Drive-by Compromise' method to deliver the cryptomining software while also potentially propagating other malware, potentially related to the Mirai botnet.
While there were no specific malware hashes provided that could be associated with this attack, we have substantial evidence from the commands executed during the attack, as well as from ThreatFox and MalwareBazaar, supporting the involvement of known malware URLs and a botnet that takes advantage of IoT vulnerabilities.

This collective analysis indicates a financially-motivated attack exploiting a known vulnerability (Log4Shell) in the system to install cryptojacking malware and potentially propagate a botnet variably linked to the Mirai family.
In summary, the key points known about the attack are the malicious use of the Log4Shell vulnerability to execute arbitrary code on vulnerable systems, the attempts to install a crypto miner, and the distribution and potential execution of botnet-related binaries, specifically those associated with the well-known Mirai botnet.

# Which vulnerability does the attack attempt to exploit?
The vulnerability being exploited is the "Log4Shell" vulnerability that has been discovered in Apache's Log4j logging library. The vulnerability, known as "Log4j 2 - Remote Code Execution (RCE)" has been assigned CVE-2021-44228 by MITRE.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -495,41 +495,6 @@ If further investigation is needed, we could look at vulnerability databases, ma
---


## Prompt: use malpedia to explain XMRrig

**Run ID:** `run_pE9bDlt5xdjvIkeSyErnJmp3`

### Funciton Calls
**Step ID:** `step_vJJPY3HpeuH8pJ52HxbFw0P9`

**Function called:** `query_malpedia`

| Argument | Value |
| --- | --- |
| `malpedia_name` | `win.xmrig` |

| Output | Value |
| --- | --- |
| `win.xmrig` | `{'malpedia': {'description': 'According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users\' consent. This deceptive marketing method is called "bundling".\r\n\r\nIn most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.'}}` |


<details>
<summary>
<h3>Answer</h3>
</summary>

[XMRig](https://github.com/xmrig/xmrig) is an open-source software project that is completely legitimate in its intended use. It provides code to mine Monero, a popular cryptocurrency, using system resources, specifically the CPU. Similar to many other open-source projects, it is designed and intended for use by the system owner.

However, this software is often misused by cybercriminals, who infiltrate systems and install XMRig without the user's consent. This kind of illegitimate use falls under a practice known as "bundling". Unauthorized installation of such applications not only exploits CPU resources for mining cryptocurrency but can also result in an overall sluggish system, and might degrade hardware due to the intensive tasks.

Moreover, the bundled applications accompanying XMRig are often Potentially Unwanted Programs (PUPs) that can display intrusive advertisements and may also contain spyware functionalities to track and gather sensitive user information.

It is essential to note that the illegitimate use of XMRig, in this case, reflects the misdemeanor of the attackers and not a flaw in the XMRig software itself.
</details>

---


## Prompt: What are the IP addresses and ports involved in the attack?

**Run ID:** `run_rRalEEtdyDNpcPbBKKpZIGct`
Expand Down Expand Up @@ -940,72 +905,34 @@ In summary, both IP addresses are based in Poland, have high-risk scores, are in

## Prompt: Explain what is known about the hosts, malware, and/or exploits used in the attack using data from MalwareBazaar, ThreatFox, URLhaus, and Malpedia. Be sure to analyze the src_ips, malware hashes, and any urls or hosts found in the malware samples, commands and/or HTTP requests.

**Run ID:** `run_wLBGhWpYC3uGjS1Qhf1FX16j`

### Funciton Calls
**Step ID:** `step_ZxiGRX3hgfWTKcgH0pzBhaQ3`

**Function called:** `get_attack_attrs`

| Argument | Value |
| --- | --- |
| `attrs` | `['uniq_malware']` |

| Output | Value |
| --- | --- |
| `uniq_malware` | `{}` |

**Step ID:** `step_KQ0eYMnXekJmVd2mJLfVpceS`

**Function called:** `query_ioc_data`

| Argument | Value |
| --- | --- |
| `ioc_type` | `ip` |
| `iocs` | `['141.147.74.15']` |
| `sources` | `['threatfox', 'urlhaus', 'malwarebazaar']` |

| Output | Value |
| --- | --- |
| `141.147.74.15` | `{'threatfox': '', 'urlhaus': {'host': '141.147.74.15', 'url_count': '5', 'urls': [{'id': '2753831', 'url': 'http://141.147.74.15/system32/paraiso.sh4', 'url_status': 'URL is online and currently serving a payload', 'date_added': '2024-01-30 23:32:13 UTC', 'threat': 'malware_download', 'tags': ['32', 'elf', 'mirai', 'renesas'], 'malpedia_names': ['elf.mirai'], 'url_reported_to_hosting_provider': 'true'}, {'id': '2753828', 'url': 'http://141.147.74.15/system32/paraiso.arm5', 'url_status': 'URL is online and currently serving a payload', 'date_added': '2024-01-30 23:32:12 UTC', 'threat': 'malware_download', 'tags': ['32', 'arm', 'elf', 'mirai'], 'malpedia_names': ['elf.mirai'], 'url_reported_to_hosting_provider': 'true'}, {'id': '2753829', 'url': 'http://141.147.74.15/system32/paraiso.arm', 'url_status': 'URL is online and currently serving a payload', 'date_added': '2024-01-30 23:32:12 UTC', 'threat': 'malware_download', 'tags': ['32', 'arm', 'elf', 'mirai'], 'malpedia_names': ['elf.mirai'], 'url_reported_to_hosting_provider': 'true'}, {'id': '2753830', 'url': 'http://141.147.74.15/system32/paraiso.ppc', 'url_status': 'URL is online and currently serving a payload', 'date_added': '2024-01-30 23:32:12 UTC', 'threat': 'malware_download', 'tags': ['32', 'elf', 'mirai', 'PowerPC'], 'malpedia_names': ['elf.mirai'], 'url_reported_to_hosting_provider': 'true'}, {'id': '2753773', 'url': 'http://141.147.74.15/system32/paraiso.x86', 'url_status': 'URL is online and currently serving a payload', 'date_added': '2024-01-30 20:56:10 UTC', 'threat': 'malware_download', 'tags': ['mirai'], 'malpedia_names': ['elf.mirai'], 'url_reported_to_hosting_provider': 'true'}], 'first_seen': '2024-01-30 20:56:04 UTC'}, 'malwarebazaar': ''}` |

**Step ID:** `step_8m6lnnW2KemtcCIxgk31LhMu`

**Function called:** `query_malpedia`

| Argument | Value |
| --- | --- |
| `malpedia_name` | `elf.mirai` |

| Output | Value |
| --- | --- |
| `elf.mirai` | `{'malpedia': {'description': 'Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.'}}` |

**Run ID:** `run_ZzSCF2TEdLHKAgWUXzDVko1O`

<details>
<summary>
<h3>Answer</h3>
</summary>

Based on the analysis using data from MalwareBazaar, ThreatFox, URLhaus, and Malpedia, the following is known about the hosts, malware, and exploits used in the attack:
Upon analyzing the data from MalwareBazaar, ThreatFox, URLhaus, and Malpedia, as well as the src_ips, malware hashes, and URLs or hosts found in the malware samples, commands, and HTTP requests associated with the attack, we can summarize the following points:

1. **Source IPs**: The attack originated from two IP addresses: `95.214.53.103` and `95.214.53.99`.
**Source IPs:**
- `95.214.53.103`
- `95.214.53.99`
These source IPs were both involved in the attack and have been reported as part of malicious activities.

2. **Hosts**: The host `141.147.74.15` was identified as a source from which the attacker attempted to download a binary named `paraiso.x86`. URLhaus has reported this host serving various payloads, and it's been identified in association with multiple URLs as shown in the URLhaus data.
**Hosts used in the attack:**
- `raw.githubusercontent.com` from which the crypto miner setup script was downloaded.
- `141.147.74.15` which was used to serve different variants of the malware.

3. **Associated URLs**:
- http://141.147.74.15/system32/paraiso.sh4
- http://141.147.74.15/system32/paraiso.arm5
- http://141.147.74.15/system32/paraiso.arm
- http://141.147.74.15/system32/paraiso.ppc
- http://141.147.74.15/system32/paraiso.x86
- https://raw.githubusercontent.com/C3Pool/xmrig_setup/master/setup_c3pool_miner.sh
**Malware Exploits:**
- The `Log4Shell` vulnerability (CVE-2021-44228) was exploited as a vector to conduct the attack.

4. **Malware**: The Mirai botnet variant (`elf.mirai`) was identified in the context of the hosts and associated URLs. Mirai is a well-known botnet primarily targeting networked devices running Linux. Also, a cryptocurrency miner (XMRig) setup script was fetched from a URL associated with GitHub. This indicates potential cryptomining activity on exploited systems.
**URLs and Malware Distribution:**
- From URLhaus, the host `141.147.74.15` was serving various files such as `paraiso.sh4`, `paraiso.arm5`, `paraiso.arm`, `paraiso.ppc`, and `paraiso.x86`. These files are related to the Mirai botnet, as reflected in the tags ('mirai', '32', 'elf', etc.) and are identified on URLhaus as being involved in malware distribution.
- Further analysis from Malpedia describes "elf.mirai" as a significant botnet targeting vulnerable networked devices running Linux. The botnet has been known for its ability to infect many devices and become one of the largest sources of DDoS attacks.

The exploitation involved an encoded attack sequence leveraging the Log4j vulnerability (CVE-2021-44228, "Log4Shell"), and the exploitation resulted in successful command execution. The attack pattern suggests that the attacker employed a 'Drive-by Compromise' method to deliver the cryptomining software while also potentially propagating other malware, potentially related to the Mirai botnet.
While there were no specific malware hashes provided that could be associated with this attack, we have substantial evidence from the commands executed during the attack, as well as from ThreatFox and MalwareBazaar, supporting the involvement of known malware URLs and a botnet that takes advantage of IoT vulnerabilities.

This collective analysis indicates a financially-motivated attack exploiting a known vulnerability (Log4Shell) in the system to install cryptojacking malware and potentially propagate a botnet variably linked to the Mirai family.
In summary, the key points known about the attack are the malicious use of the Log4Shell vulnerability to execute arbitrary code on vulnerable systems, the attempts to install a crypto miner, and the distribution and potential execution of botnet-related binaries, specifically those associated with the well-known Mirai botnet.
</details>

---
Expand Down

0 comments on commit 04c00a1

Please sign in to comment.