来源:https://bazaar.abuse.ch/sample/4069c7c6838a37b7f273724e379abce999a696ec9d24e3add3f1908c53321f37/

时间:2021

背景:Gafgyt malware first made its appearance back in 2014 as a malware strain that exploited known vulnerabilities in small home and small office (SOHO) routers to launch Distributed Denial of Service (DDoS) attacks, much like those orchestrated by the well-known Mirai botnet.

该程序是ARM32 ELF

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/2d17139f-8447-46c5-b2b1-7ad209619b3f/Untitled.png

进入main函数,程序会先修改自身参数和通过prctl设置进程名

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/9c1fbb09-1c5d-45ed-bd51-e7d8da0db047/Untitled.png

通过socket获取ip,设置程序当前目录到根目录

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/90290705-b1cb-4100-b37c-f10c264609c0/Untitled.png

进入被控循环

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/6f789531-2690-4820-aed3-347bfc7e72e9/Untitled.png

首先分割c2 ip和port ,连接上c2 45.61.185.83:812

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/20df8728-df02-49f7-9e64-e4342a2d3f1b/Untitled.png

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/5d71e485-5fa1-4bf9-8456-967a27925629/Untitled.png

发送上线信息并删除某些文件,如bash_history,关闭防火墙

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/5e1f3eac-a291-4f17-8af5-1b8d89880003/Untitled.png

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/82cd0466-4903-417e-a519-e4a8323efaec/Untitled.png

循环从c2接收指令 并且执行

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b60557c2-dd39-42d7-9ba7-f2c6a79a2526/Untitled.png

telnet扫描爆破,通过ON/OFF控制扫描功能