返回 TI 主页

Overview

RedGoBot is a DDoS Botnet family written in the Go programming language, first exposed by QiAnXin Threat Intelligence Center in early December 2022.

By the end of July 2023, our unknown threat monitoring system detected IP address 185.224.128.141 aggressively targeting common Telnet service ports and spreading a DDoS botnet trojan written in the Go programming language. Through our analysis, we identified this as a new variant of the previously exposed RedGoBot, a family we had encountered before.

This variant of the family borrows certain functionalities from Mirai's design, such as creating a dedicated ensureSingleInstance() function to ensure a single instance runs by listening on a local port, and implementing a similar Killer mechanism to terminate specific processes. Compared to the older version, a notable change in this new version is the use of Base64 encoding for all critical strings, which are decoded in real-time during execution. Before propagating the latest variant sample, RedGoBot briefly spread an intermediate version. The core functionality of this intermediate version matches the latest version, except that the internal strings are not Base64 encoded, and it also includes samples for the Windows version.

After an in-depth analysis, we have named this variant as RedGoBot_v2. The recent propagation trend of this Botnet family is as follows:


Updates to Sample Functionality

String Encryption

Key strings in the new version of RedGoBot are encoded in Base64 and are decoded using functions before their utilization during runtime:


Init Function

The init function in Go language is used to initialize bulk-decryption of strings containing whitelist directory or filename information required by the Kill function. Similar to the previous version, this sample attempts to terminate processes of "suspicious competitors":


Persistence

In the older version of RedGoBot, a malicious service was created for achieving persistence. Details of the service are as follows:

However, the new version employs four different methods for achieving persistence:

  • Creating a service:

  • Modifying the bashrc file to append malicious code at the end of the .bashrc file in the current user's home directory:

  • Creating a conf file in the init folder:

  • Leveraging the crontab command:


Singleton Execution

Ensuring a single instance through port monitoring, with the corresponding port being 32183:


Propagation Methods

In addition to retaining the Telnet brute-forcing propagation mechanism similar to the old version, the new version has introduced an SSH brute-forcing method. For Telnet services, it targets 7 ports, namely 23/2323/80/5523/2601/2002/1025:

And preparations have been made for 219 sets of weak credentials for Telnet service brute-forcing:

For SSH service brute-forcing, there are 5 targeted SSH service ports: 22/2222/8888/8443/443

Additionally, preparations have been made for 67 sets of weak credentials for SSH service brute-forcing.

Once successful SSH or Telnet service brute-forcing occurs, the compromised host will execute the following malicious commands:


DDoS Attacks

In the new version of RedGoBot, the DDoS attack method is still implemented based on Golang Interface, and the author has wrapped a new attack function called main_getAttack():

Furthermore, this discovered version has introduced multiple new DDoS attack methods compared to the old version. The newly added methods are as follows:

- -
Name Description
HttpCache_Send HTTP Flood (Cache)
HttpHead_Send HTTP Flood (Head)
IPIP_Send IP DDoS
OVHBypass_Send OVH DDoS
Ssh_Send SSH DDoS

Conclusion

From its initial discovery, RedGoBot has been a relatively sophisticated zombie network family. After half a year, the author has started to improve its samples. Similar to the past, rather than immediately conducting large-scale propagation, the author has initiated dissemination after completing the new version of samples, then returning to a state of calm:

Below is the recent propagation trend of another C2 server address for the RedGoBot_v2 version. It can be observed that the author has been conducting propagation tests in recent days:

Based on this analysis and our previous disclosures related to the RedGoBot zombie network, the following conclusions can be drawn:

  • The group is highly proficient in writing and operating zombie networks;
  • In addition to RedGoBot, the group also possesses several other zombie networks, including RedSocksBot, Mirai, etc;
  • The group has also distributed backdoor Trojan files for the Windows platform, not limited to attacking Linux platforms with the spread of zombie network samples. However, the worm-like spreading capability of Windows platform samples is still focused on Linux platform Telnet and SSH services.

IOCs

RedGoBot_v2 C2:

wq.gy

alternatevm.us

194.55.224.36:6002

Mirai C2:

cnc.wq.gy

cnc.hpyq.cc

cnc.biggieboat.cc

Download URL:

hxxp://185.224.128.141/linux/bins.sh

hxxp://194.180.49.171/linux/bins.sh

MD5:

dcecb4260d05460f75efbc8411f85bec

d7025e72a344bffa7475d7145ff60142

21f6c6644eef92015f88ac1105225408

ff2b13413318142ccb8843299e946fc6

39e70806b717bfc670682bb2b5f6d4a6

3588e0aca3d154b080f46420844bb895

b9fea51c6612715d37020c28ba2d10ce

c3869061a13948549261153e4bb8e93a

ac472c260ad65cdd6babfd2ea13a1d96

c5c2d5b4d4a426ea03be2d41c2498732

886bc578a55604a99e2e9a1903b9af7a

ec5ce68f2354acd0fb538347f098cc05

7c3d7aeb50a4619628428626b85782b5

efec7a2bd92e111716580d79614cda64

31fe0e51626ca2cc7ef520c774748d7a

73a1daf7fbe4ab671d621110c4ed4b02

b79fcc89b74ce2dd12b55c3f36c0ddcf

bf2a4ca1b03dc35fcc4595ad3f03a4d2

ba9da2db798a9d0d2cb116d84ece3df2

e188aacfedf07e6ed629dcaf46eadb97

a5ce1f5b5db5e7574b30379ca26d1551

eb575f965d662a93eaf17999e869b227

c0e9817868eed90cd7a97f9147cde5d6

fbef20c6ec117784243dda663f2889ba

f309c9a475969a731578474527fadfcb

b8956fffc8b12b4effc0d528c77a5b77

75b0ca83968e353d1c823b1e77f9d187

REDGOBOT