anatomyofreallinuxintrusion-alonso2016

0001-01-01

Anatomy of a Real Linux Intrusion Part II: OpenSSH trojanized toolkit

by Angel Alonso

https://blog.angelalonso.es/2016/09/anatomy-of-real-linux-intrusion-part-ii.html

Notes
This is Abafar as highlighted in sshbackdors-dumont2018
honeypot
Raspberry Pi 3
HonSSH
SSH MiTM
SSH scanning
SSH brute force
IRC bouncer
cybercrime
command and control
trojan
rootkit
anti-forensics
sniffer
IP address IoC
after credentials were obtained via brute forcing, the attackers came back from a separate IP address at a later time
unset HISTFILE, export HISTFILE=/dev/null
hidden directory
wget
adding malicious nameserver to /etc/resolv.conf
cat /etc/issue enumeration
attacker made typos on command line
attacker changed password of admin user to “modrepo”, then “modrepo1” (possibly due to complexity rules?)
gcc
attacker checked if gcc worked by compiling small C program
if compiler isn’t installed, attacker installs one using yum, apt, yast, or zypper
sed
curl
bash script
Romanian language comments in code samples
attribution by language
trojanizing OpenSSH
dropper pulls architecture-specific files: ARMv7, mips64, vyos64, vyos,
Vyos
OpenSSH
backdoors scp, sftp, ssh, sshd binaries
stack strings
auth-passwd.c altered to include hard-coded password PRtestD for any user
logs user, password, and IP of incoming ssh connections
logs to etc/X11.pr hidden file
does not log connections if backdoor password was used: sshlogin.c
removes logs /var/log/messages, /var/log/secure, /var/log/fastlog, /var/log/wtmp
goprem.c: setgid(0); setuid(0); execl("/bin/sh:, 0); generic privesc
timestomps /usr/sbin/sshd, /usr/bin/ssh, /usr/bin/sftp, /usr/bin/scp
chmod 777
http[:]//gopremium.mooo[.]com/ hosted several of the files
events.c: masquerades a process as kernel thread “[pdflush-0]”
events.c: runs /usr/sbin/ptty every 3600 seconds, checking in to C2
malware is able to update itself
/usr/sbin/env shell script is malicious
/etc/init/env.conf
possible source code: https://github.com/jivoi/openssh-backdoor-kit/tree/master/openssh-5.9

Links to this note