• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Internet of Things   »   Mirai Widens Distribution with New Trojan that Scans More Ports

Mirai Widens Distribution with New Trojan that Scans More Ports

  • Posted on:February 13, 2017 at 5:00 am
  • Posted in:Internet of Things, Malware
  • Author:
    Giannina Escueta (Technical Communications)
0

Analysis by Julie Cabuhat

Late last year, in several high-profile and potent DDoS attacks, Linux-targeting Mirai (identified by Trend Micro as ELF_MIRAI family) revealed just how broken the Internet of Things ecosystem is. The malware is now making headlines again, thanks to a new Windows Trojan that drastically increases its distribution capabilities.

We predicted last year that the propagation of Mirai-like malware for DDoS attacks is set to increase—but this new Trojan focuses on spreading Mirai itself and not any mimic. In 2015 and 2016, Mirai relied on a type of brute-force attack, with bots constantly pinging IP addresses to pinpoint more potential victims. This newly-identified Windows Trojan (detected by Trend Micro as BKDR_MIRAI.A) helps find potential Mirai victims, and amplifies the Mirai bots distribution.

The Windows Trojan connects to the C&C server to find the IPs to be scanned. If it successfully logs into its targeted system, it checks the OS running on the targeted machine. If it is running Linux, it drops the Mirai malware to create a new bot. If the machine is running Windows, then the Trojan copies itself into the machine and continues to look for Linux targets. The Trojan can drop two different payloads, one for Linux machines and another for Windows.

The original Mirai was discovered in August 2016 and targets IoT devices running Linux-based firmware: routers, digital video recorders, printers, CCTV cameras and others. To infect these devices the malware chooses random IPs and attempts to use default administrative credentials to take over the device via ports 7547 and 5555 (TCP/UDP), 22 (SSH) and 23 (Telnet). After the source code was exposed to the public in October 2016, attacks increased. Variants were used in attacks that affected major sites like Netflix, Reddit, Twitter and AirBnB, as well as 900,000 home routers from Deutsche Telekom.

Figure 1. Windows Trojan port scanning code

Figure 1. Windows Trojan port scanning code

The Windows Trojan targets more ports that the original Linux Mirai, hunting for every possible avenue of infection. It checks if the following ports are open: 22 (SSH), 23 (Telnet), 135 (DCE/RPC), 445 (Active Directory), 1433 (MSSQL), 3306 (MySQL) and 3389 (RDP). These ports are typically kept open for a variety of reasons: aiding the writing of distributed software, file sharing, and remote device administration

Based on the ports targeted, we can see that the Trojan also works to identify host software like MySQL and Microsoft SQL Server databases. If one of these is identified, it will try to create a new user with administrative privileges. Specifically, when it encounters the Microsoft SQL Server it will create a database user “Mssqla” with sysadmin privileges. With that level of access, a malicious user could change server-wide configuration options and shut down the server, change logins and their properties, end running processes, run the BULK INSERT statement, and also create, alter, drop or restore any database.

This Windows Trojan is designed simply to distribute Mirai, but it also has potential to evolve. It could easily expand to distribute other malware, and since it targets Windows devices it allows Mirai to broaden its activities as well.

This malware could also be used to compromise IoT devices within the same network as its infected victim. The IP addressing of home networks is usually very predictable—most home routers use the 192.168.x.x IP space. Since the Windows Trojan gets the IP addresses it hits from the central C&C server, the server could instruct the Trojanized device to scan the local IP space. This would result in the compromise of all connected IoT devices using default passwords.

Trend Micro™ Security and Trend Micro Internet Security offer effective protection for this threat, with security features that can detect malware at the endpoint level. To protect IoT devices like home routers, security solutions like Trend MicroTM Home Network Security can check internet traffic between the router and all connected devices. Enterprises can use Trend Micro™ Deep Discovery™ Inspector which is a network appliance that monitors all ports and over 105 different network protocols to discover advanced threats and targeted attacks.

Our BKDR_MIRAI.A samples had the following SHA1 hashes:

  • 42c9686dade9a7f346efa8fdbe5dbf6fa1a7028e
  • F97E8145E1E818F17779A8B136370C24DA67A6A5
  • 9575D5EDB955E8E57D5886E1CF93F54F52912238
  • 938715263e1e24f3e3d82d72b4e1d2b60ab187b8

TippingPoint customers are protected from this vulnerability with the following MainlineDV filter:

  • 27134: HTTP: BKDR_MIRAI.A Checkin





Related posts:

  • Routers Under Attack: Current Security Flaws and How to Fix Them
  • Home Routers: Mitigating Attacks that can Turn them to Zombies
  • Exploit Kits in 2015: Scale and Distribution
  • BANKER Trojan Sports New Technique to Take Advantage of 2016 Olympics
Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: MiraiRDPTelnet

Featured Stories

  • Uncovering the Inner Workings of EyePyramid
  • In Review: 2016’s Mobile Threat Landscape Brings Diversity, Scale, and Scope
  • How Cyber Propaganda Influenced Politics in 2016
  • Alice: A Lightweight, Compact, No-Nonsense ATM Malware
  • Home Routers: Mitigating Attacks that can Turn them to Zombies

Business Email Compromise

  • How can a sophisticated email scam cause more than $2.3 billion in damages to businesses around the world?
    See the numbers behind BEC

Latest Ransomware Posts

  • Brute Force RDP Attacks Plant CRYSIS Ransomware
  • Netflix Scam Delivers Ransomware
  • Recent Spam Runs in Germany Show How Threats Intend to Stay in the Game
  • Mobile Ransomware: How to Protect Against It
  • Mobile Ransomware: Pocket-Sized Badness

Recent Posts

  • Mirai Widens Distribution with New Trojan that Scans More Ports
  • Brute Force RDP Attacks Plant CRYSIS Ransomware
  • Lurk: Retracing the Group’s Five-Year Campaign
  • Routers Under Attack: Current Security Flaws and How to Fix Them
  • EyePyramid and a Lesson on the Perils of Attribution

Ransomware 101

  • This infographic shows how ransomware has evolved, how big the problem has become, and ways to avoid being a ransomware victim.
    Check the infographic

Popular Posts

  • Practical Android Debugging Via KGDB
  • Uncovering the Inner Workings of EyePyramid
  • In Review: 2016’s Mobile Threat Landscape Brings Diversity, Scale, and Scope
  • The Eye of the Storm: A Look at EyePyramid, the Malware Supposedly Used in High-Profile Hacks in Italy
  • Not so Limitless after all: Trend Micro FTR Assists in the Arrest of Limitless Author

Latest Tweets

  • How is #CRYSIS #ransomware being spread? Now it’s being spread via #RDP attacks: bit.ly/2ksrMEe
    about 3 hours ago
  • #GDPR includes key individual rights that aim to enhance digital privacy of customers. How can SMBs adhere to them?… twitter.com/i/web/status/8…
    about 6 hours ago
  • New post: Mirai Widens Distribution with New Trojan that Scans More Ports bit.ly/2lGomOr @TrendMicro
    about 7 hours ago

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.