Cryptocurrency Mining Botnet Arrives Through ADB and Spreads Through SSH

by Jindrich Karasek

We observed a new cryptocurrency mining botnet that arrives via open ADB (Android Debug Bridge) ports and can spread via SSH. This attack takes advantage of the way open ADB ports don’t have authentication by default, similar to the Satori botnet variant we previously reported. This botnet’s design allows it to spread from the infected host to any system that has had a previous SSH connection with the host.

The use of ADB makes Android-based devices susceptible to the malware. We detected activity from this botnet in 21 different countries, with the highest percentage found in South Korea.

Technical details
ADB Arrival
We found that the IP address 45[.]67[.]14[.]179 connects to the ADB running device or system then conducts several activities. Figure 1 summarizes the attack’s infection chain.

Figure 1. Infection chain of the attack

The attack starts by using the ADB command shell to change the attacked system’s working directory to “/data/local/tmp”. This is because .tmp files typically have default permission to execute.

The bot then determines the kind of system it has entered and whether the system is a honeypot or not, as indicated by the command “uname –a”.

It then uses wget to download the payload, and curl if wget is not present in the infected system. The bot then issues the command “chmod 777 a.sh” to change the permission settings of the downloaded payload, allowing it to be executed.

Finally, when “a.sh” is executed, it is removed using the command “rm -rf a.sh*” to remove its traces. All these commands can be seen in the malware’s code as seen in Figure 2.

Figure 2. Snapshot of the malware’s script showing the commands it executes

The payload

The script for a.sh reveals that this attack will choose from three different downloadable miners. This can be seen in the output of the “uname -m” command, shown in Figure 2 above.

The uname –m command, once executed, gets the infected system’s information, such as its manufacturer, hardware details, and processor architecture. The output from this command is used as a variable for determining the miner to use in the attack.

As mentioned earlier, if uname –m gets the string indicating the infected system’s processor type, then it uses the additional wget command to download the miner. It will use curl if the system does not have wget.

The three miners that can be used for this attack are listed below, all of which are delivered by the same URL.

  • http://198[.]98[.]51[.]104:282/x86/bash
  • http://198[.]98[.]51[.]104:282/arm/bash
  • http://198[.]98[.]51[.]104:282/aarch64/bash

To optimize the mining activity, the script also enhances the victim’s memory by enabling HugePages, which will help the system support memory pages that are greater than its default size. This ability can be seen in the script as “/sbin/sysctl -w vm.nr_hugepages=128”.

This botnet also tries to block its competitor by modifying /etc/hosts. By adding the additional record  “0.0.0.0 miningv2.duckdns.org”, it blocks the URL of the competing miner. It also kills that competitor’s  process with the command “pkill -9 r32”.

Lastly, it employs an evasion technique that involves deleting the downloaded files. After spreading to other devices connected to the system, it deletes its payload files, removing the traces on the victim host.

Spreading mechanism

Another notable aspect of this attack, although certainly not unique to it, is the presence of a spreading mechanism that uses SSH. Any system that has connected to the original victim being attacked via SSH is likely to have been listed as a “known” device on its operating system. Being a known device means the two systems can communicate with each other without any further authentication after the initial key exchange, each system considers the other as safe. The presence of a spreading mechanism may mean that this malware can abuse the widely used process of making SSH connections.

This list of known devices and the SSH settings are saved in known_hosts, which can be seen in the malware’s code. The combination of known hosts and the victim’s public key makes it possible for the botnet to connect to smart devices or systems that have previously connected to the infected system. It does so using two spreaders, as can be seen in Figures 3 and 4.

Figure 3. Snapshot of the code showing the first spreader of the malware

Figure 4. Snapshot of the code showing the second spreader of the malware

The first spreader takes all the systems from known hosts by IPv4 addresses, access them, and installs the same miner used in the originally attacked system. The second script has the same purpose, but it searches in a different directory for the “known_hosts”. These two spreaders allow the botnet to attack and likely infect the other systems that communicate with the first affected system.

Conclusion and security recommendations
Although ADB is a useful feature for administrators and developers, it is important to remember that an enabled ADB might expose the device and those connected to it to threats.

Users can also follow other best practices for defending against illicit cryptocurrency mining activities and botnets, such as:

  • Check and change default settings when necessary to increase security
  • Update device firmware and apply available patches
  • Be aware of methods attackers use to spread these types of malware and tailor defenses against them.

Android users can take advantage of Trend Micro™ Mobile Security for Android™ (available on Google Play) to block malicious apps that may exploit this vulnerability. End users and enterprises can also benefit from its multilayered security capabilities that secure the device’s data and privacy, and safeguard them from ransomware, fraudulent websites, and identity theft. For organizations, Trend Micro™ Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning. It also protects devices from attacks that leverage vulnerabilities, prevents unauthorized access to apps, and detects and blocks malware and access to fraudulent websites.

Users can also adopt multilayered security solutions that can provide protection from various iterations of cryptocurrency-mining malware. Trend Micro XGen™ security provides high-fidelity machine learning that can secure the gateway and endpoints, and protect physical, virtual, and cloud workloads.

Indicators of Compromise (IoCs)
URLs

  • 45[.]67[.]14[.]179
  • http://198[.]98[.]51[.]104:282
SHA256 Detection Name Filename
1685bc0b9923c628fcb11bdf2967db3a0639b5f603204da658a14a99410802e3 Coinminer.Linux.ADBMINER.A Bash
4f4f6ffaf9ead9f90ed738c9100b073af241cadfd2be6b89ede6d42f2a87254f Trojan.Linux.ADBMINER.A 1
5d81436b511e9c39bdc5bcedf0ae6ac7ba6e1cb22f6d736d04b271d390c4675c Trojan.Linux.ADBMINER.A a.sh
7cc15106ded4030b0e9468754cafd0ab08e5f23dca71f4020fad61c23744f034 Trojan.Linux.ADBMINER.A 2
ebccd99b3fe1fa0a535e43b05e512958d4b2edfa5fa2ab5a7e218ef8f6ef57ad Trojan.Linux.ADBMINER.A i.sh

 

The post Cryptocurrency Mining Botnet Arrives Through ADB and Spreads Through SSH appeared first on .

Read more: Cryptocurrency Mining Botnet Arrives Through ADB and Spreads Through SSH

Story added 20. June 2019, content source with full text you can find at link above.