{"id":11245,"date":"2018-01-25T20:41:20","date_gmt":"2018-01-26T04:41:20","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/25\/news-5016\/"},"modified":"2018-01-25T20:41:20","modified_gmt":"2018-01-26T04:41:20","slug":"news-5016","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/25\/news-5016\/","title":{"rendered":"IoT Botnet: More Targets in Okiru&#039;s Cross-hairs"},"content":{"rendered":"<p><strong>Credit to Author: Rommel Joven &amp; David Maciejak| Date: Thu, 25 Jan 2018 19:05:59 +0000<\/strong><\/p>\n<div class=\"entry\">\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/shamoon\/More%20images\/Google\/Google2\/Google3\/More%20Google\/Evasive01\/evasive3\/Ichitaro\/Demand%20Banners\/Partner%20blog\/blog%20blog\/Blog%20blog%20blog\/Blog%20blog%20blog%20blog\/Demand%20Banners\/PowerDNS\/power%20dns%202\/verticals%20blogs\/blogs%20Jan%2012\/Meltdown%20Spectre%203\/Meltdown%20Spectre%204\/iot%20botnet\/botnet0.png\" style=\"width: 500px; height: 467px;\" \/><\/p>\n<p>Recently, security researcher <a href=\"https:\/\/twitter.com\/unixfreaxjp\">@unixfreaxjp<\/a> <a href=\"https:\/\/twitter.com\/_odisseus\/status\/952641540094033920?ref_src=twsrc%5Etfw&amp;ref_url=http%3A%2F%2Fsecurityaffairs.co%2Fwordpress%2F67742%2Fmalware%2Fmirai-okiru-botnet.html\">discovered<\/a> a new variant of the Okiru botnet, which includes an ELF malware that targets the ARC CPU architecture. This was a significant discovery since ARC or <a href=\"https:\/\/en.wikipedia.org\/wiki\/ARC_(processor)\">Argonaut RISC Core<\/a> processors are widely used for System on a Chip (SoC) in IoT devices, and are currently being dispatched in more than 1.5 billion products per year. Arc processors are also the second most popular CPU in the world, and have been licensed by more than <a href=\"http:\/\/www.techdesignforums.com\/practice\/technique\/power-performance-processor-ip\/\">190 companies<\/a>. The sheer number of potential targets makes this botnet variant more dangerous than ever, and could potentially cause the same degree of havoc as occurred with the DNS service provider Dyn.<\/p>\n<p>The first Okiru sample appeared around October 2017, and <a href=\"https:\/\/www.fortinet.com\/fortiguard\/threat-intelligence\/threat-research.html\">FortiGuard Labs<\/a> created a <a href=\"https:\/\/blog.fortinet.com\/2017\/12\/12\/rise-of-one-more-mirai-worm-variant\">write up<\/a> of its development last December, which included worm capabilities and the embedding of two different exploits. As a follow up, we will now share our findings on the latest Okiru variant that targets ARC processors.<\/p>\n<p>Let&rsquo;s get right to it.<\/p>\n<h1>Okiru ARC<\/h1>\n<p><em>ARC sample: 2356c1d64995ee825c728957f7428543101c3271ac46e78ce2c98278a4480e4d<\/em><\/p>\n<p>During our analysis of the Okiru sample, we found it had ELF files embedded in its code. To dump the embedded files we created an IDA python script and searched the magic string &ldquo;7F 45 4C 46&rdquo; (ELF). With this we were able to uncover 11 files with different architectures.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/shamoon\/More%20images\/Google\/Google2\/Google3\/More%20Google\/Evasive01\/evasive3\/Ichitaro\/Demand%20Banners\/Partner%20blog\/blog%20blog\/Blog%20blog%20blog\/Blog%20blog%20blog%20blog\/Demand%20Banners\/PowerDNS\/power%20dns%202\/verticals%20blogs\/blogs%20Jan%2012\/Meltdown%20Spectre%203\/Meltdown%20Spectre%204\/iot%20botnet\/botnet1.png\" style=\"width: 768px; height: 300px;\" \/><\/p>\n<p align=\"center\">Fig 1. Ida Output Window<\/p>\n<p>Upon analysis of the dumped file we determined that these executables function as downloaders. This means that Okiru has the capability to infect a wide range of IOT devices as long as they&rsquo;re supported by the architecture of its downloaders.<\/p>\n<p>So are these embedded downloaders new? Well, no.<\/p>\n<p>To explain, let&rsquo;s take a look at another Okiru sample, which was seen October 31, 2017:<\/p>\n<p><em>Intel x86 sample: e5fc493874f2a49e1a1594f3ee2254fa30e6dd69c6f24d24a08a562f03b2fd26 <\/em><\/p>\n<p>This sample has the same embedded ELF downloaders as the Okiru ARC. Also, the code includes a function for checking the architecture, as shown below. The most interesting elemet is the last one, where <a href=\"http:\/\/www.sco.com\/developers\/gabi\/latest\/ch4.eheader.html\">e_machine<\/a> is compared to <em>93, which<\/em> is the ARC International ARCompact processor.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/shamoon\/More%20images\/Google\/Google2\/Google3\/More%20Google\/Evasive01\/evasive3\/Ichitaro\/Demand%20Banners\/Partner%20blog\/blog%20blog\/Blog%20blog%20blog\/Blog%20blog%20blog%20blog\/Demand%20Banners\/PowerDNS\/power%20dns%202\/verticals%20blogs\/blogs%20Jan%2012\/Meltdown%20Spectre%203\/Meltdown%20Spectre%204\/iot%20botnet\/botnet2.png\" style=\"width: 397px; height: 870px;\" \/><\/p>\n<p align=\"center\">Fig 2. Targeted Architecture<\/p>\n<p>&nbsp;<\/p>\n<p>Even though the ARC Okiru was only seen recently, based on the sample from last October it is clear that Okiru has been checking for ARC devices for some time. This suggests that even though it wasn&rsquo;t supported at that time, it was already on Okiru&rsquo;s cross-hairs.<\/p>\n<h1>Downloaders<\/h1>\n<p>Having dumped the 11 downloader files from Okiru, we focused our analysis on the Intel x86 sample. The pseudocode of the downloader is quite straight-forward, starting by connecting to its C&amp;C 37.48.99.233 at port 5543. Interestingly, the port used is not a reserved port and could be beneficial for bypassing firewall rules if not properly configured.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/shamoon\/More%20images\/Google\/Google2\/Google3\/More%20Google\/Evasive01\/evasive3\/Ichitaro\/Demand%20Banners\/Partner%20blog\/blog%20blog\/Blog%20blog%20blog\/Blog%20blog%20blog%20blog\/Demand%20Banners\/PowerDNS\/power%20dns%202\/verticals%20blogs\/blogs%20Jan%2012\/Meltdown%20Spectre%203\/Meltdown%20Spectre%204\/iot%20botnet\/botnet3.png\" style=\"width: 528px; height: 390px;\" \/><\/p>\n<p align=\"center\">Fig 3. Downloader Pseudocode<\/p>\n<p>The data being sent to its C&amp;C is a <em>hardcoded_value <\/em>that corresponds to the device&rsquo;s architecture (see table 1). During our analysis, the C&amp;C was already down and had no response. But reading the code we can see that the C&amp;C responds with some data, which we suspect is the main payload with the correct architecture, and afterwards, this data is written locally to the device.<\/p>\n<p>The following are the supported architectures for the payload (as of now.)<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/shamoon\/More%20images\/Google\/Google2\/Google3\/More%20Google\/Evasive01\/evasive3\/Ichitaro\/Demand%20Banners\/Partner%20blog\/blog%20blog\/Blog%20blog%20blog\/Blog%20blog%20blog%20blog\/Demand%20Banners\/PowerDNS\/power%20dns%202\/verticals%20blogs\/blogs%20Jan%2012\/Meltdown%20Spectre%203\/Meltdown%20Spectre%204\/iot%20botnet\/Table%201.png\" style=\"width: 369px; height: 259px;\" \/><br \/>  Table 1. Architecture with the hardcoded values<\/p>\n<h1>Conclusion<\/h1>\n<p>By actively adding support for other architectures, Okiru has created a leverage to its other Mirai-based botnets. And with majority of IoT devices still using default and\/or predictable passwords, only time will tell on the number of botnets that Okiru will be able to control.<\/p>\n<p>FortiGuard Labs will continue to monitor the latest threats and developments in IoT and share interesting findings.<\/p>\n<p><em>We thank our teammates Jasper Manuel and Dario Durando for the additional analysis.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>-= FortiGuard Lion Team =-<\/p>\n<p>&nbsp;<\/p>\n<p><strong>IOC<\/strong><\/p>\n<p><em>e5fc493874f2a49e1a1594f3ee2254fa30e6dd69c6f24d24a08a562f03b2fd26 &ndash; ELF\/Mirai.AO!tr<\/em><\/p>\n<p><em>2356c1d64995ee825c728957f7428543101c3271ac46e78ce2c98278a4480e4d &ndash; Linux\/Mirai.Y!tr.bdr<\/em><\/p>\n<p><strong><em>CC<\/em><\/strong><\/p>\n<p><em>37.48.99.233<\/em><\/p>\n<p><em>Sign up for our weekly FortiGuard&nbsp;<\/em><a href=\"https:\/\/fortiguard.com\/resources\/threat-brief\"><em>intel briefs<\/em><\/a>&nbsp;<em>or<\/em>&nbsp;<em>to be a part of our&nbsp;<\/em><a href=\"https:\/\/tis.fortiguard.com\/signup\/\"><em>open beta<\/em><\/a><em>&nbsp;of Fortinet&rsquo;s FortiGuard Threat Intelligence Service.<\/em><\/p>\n<\/div<br \/><a href=\"https:\/\/blog.fortinet.com\/2018\/01\/25\/iot-botnet-more-targets-in-okirus-cross-hairs\" target=\"bwo\" >https:\/\/blog.fortinet.com\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/shamoon\/More%20images\/Google\/Google2\/Google3\/More%20Google\/Evasive01\/evasive3\/Ichitaro\/Demand%20Banners\/Partner%20blog\/blog%20blog\/Blog%20blog%20blog\/Blog%20blog%20blog%20blog\/Demand%20Banners\/PowerDNS\/power%20dns%202\/verticals%20blogs\/blogs%20Jan%2012\/Meltdown%20Spectre%203\/Meltdown%20Spectre%204\/iot%20botnet\/botnet0.png\"\/><\/p>\n<p><strong>Credit to Author: Rommel Joven &amp; David Maciejak| Date: Thu, 25 Jan 2018 19:05:59 +0000<\/strong><\/p>\n<p>The first Okiru sample appeared around October 2017 ,and FortiGuard Labs created a write up of its development last December, which included worm capabilities and the embedding of two different exploits. As a follow up, we will now share our findings on the latest Okiru variant that targets ARC processors.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-11245","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11245"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11245\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11245"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}