Activity Summary - Week Ending on 8 June 2023:
- Red Sky Alliance identified 8,495 connections from new IP’s checking in with our Sinkholes
- Amazon in Columbus OH hit 20x
- 907 ‘new’ Botnets hits
- Radare2
- Dark Frost
- Globalcaja Bank
- Shiba Inu
- Cyber Attacks = War Crimes, Estonia
Red Sky Alliance Malware Activity
3.15.166.53 was reported 20 times. Confidence of Abuse is 58% ISP: Amazon Technologies Inc.; Usage Type: Data Center/ Web Hosting/Transit; Hostname(s): ec2-3-15-166-53.us-east-2.compute.amazonaws.com; Domain Name: amazon.com; Country: USA, City: Columbus, Ohio https://www.abuseipdb.com/check/3.15.166.53 |
Red Sky Alliance Compromised (C2) IP’s
IP |
Contacts |
3.15.166.53 |
32 |
34.70.27.202 |
11 |
77.68.119.205 |
10 |
18.142.255.173 |
10 |
3.20.205.156 |
9 |
On 7 June 2023, Red Sky Alliance identified 8,495 connections from new unique IP addresses, which are checking in with one of the many Red Sky Alliance sinkholed domains.
Malware Variant |
Times Seen |
sality |
7697 |
corkow |
411 |
shiz |
110 |
sykipot |
89 |
maudi |
64 |
Top 5 Malware Variant and number of contacts. Sality and Corkow has consistently remain the top variants. |
For a full black list – contact analysts: info@redskyalliance.com
Red Sky Alliance Botnet Tracker
On 1 June 2023, analysts identified 907 new IP addresses participating in various botnets (call for full .csv Blacklists, below are only a small sampling of botnet trackers). We are currently upgrading this collection.
First_ Seen |
Botnet Attribution |
Infected Host’s IPv4 Address |
2023-05-24T12:40:18 |
HTTP proxy|port: 3128 |
3.34.176.115 |
2023-05-24T12:40:09 |
HTTP proxy|port: 3128 |
3.34.176.226 |
2023-05-24T12:40:24 |
HTTP proxy|port: 3128 |
3.34.176.238 |
2023-05-24T12:40:28 |
HTTP proxy|port: 3128 |
3.35.3.186 |
2023-05-24T12:40:27 |
HTTP proxy|port: 3128 |
3.35.6.106 |
MALICIOUS CYBER TRENDS:
Radare2 - In previous posts, Sentinel Labs explored how analysts can use radare2 (aka r2) for macOS malware triage, work around anti-analysis tricks, decrypt encrypted strings, and generate function signatures and YARA rules. Like most reversing tools, radare2 can be customized and extended to increase the analyst’s productivity and make analysis and triage much faster. In this fifth post in the series, we look at some effective ways to power up r2, providing practical examples to get you started on the path to making radare2 even more productive for macOS malware analysis. Sentinel researchers cover automation and customization via aliases, macros and functions. Along the way, we’ll also explore how we can effectively implement binary and function diffing with radare2[1].
Power Up Your .radare2rc Config File With Aliases & Macros - Just as most shells have a “read command” config file (e.g., .bashrc, .zshrc), so r2 has a ~/.radare2rc file in which you can define environment variables, aliases and macros. This file does not exist by default so you need to create it when you make your first customizations. It is often said that one of the obstacles to adopting r2 is the steep learning curve, a large part of which is getting muscle-memory familiar with r2’s cryptic commands. One very fast way to flatten that curve is to define macros and aliases for new commands as you learn them; naming any hard-to-remember native commands with your own labels. Aliases and macros are also useful for chaining oft-used commands together. If you find yourself always running the same commands as your work through your initial triage of a sample, you can save yourself some time and typing by combining those commands into one or more aliases or macros.
Useful examples are below, but first one must understand the syntax for aliases and macros. An alias is defined with a name prefixed by a $ sign, an = operator, and a value in single quotes. Values can be one or more commands, separated by a semi-colon. For example, if you struggle to remember r2’s rather cryptic command names, you could replace them with more memorable command names of your own. Create a file at ~/.radare2rc, add the following line and then save the file. Start a new r2 session. Now, typing $libs at the r2 prompt will run the il command. You can still use il directly as well – as the name suggests, aliases are just alternative names, not replacements, for existing commands.
The $libs alias prints out the linked dynamic libraries in an executable file
From the Official Radare2 book, we learn that macros are written inside parentheses with each command separated by a semi-colon. The first item in the list is the macro name. By way of example, rather than having a $libs alias, why not print out sections and linked libraries at the same time? This example would do just that: (secs; iS; il) Macros are called with the syntax .(macro) like so:
Calling a macro in r2 to print out a binary’s sections and linked libraries
It’s easy to see how you can build on this idea. I use a macro called .(meta) to give me all the basic info about a file’s structure as soon as I’ve loaded it into radare2.
Get all the info you need about a file with the meta macro
This macro provides the file hashes in various algos, the compiled language, file size, sections, section entropy and the load commands. If the file under analysis is UPX packed, it will also indicate that, and if the source code is Go it displays the Go Build ID string. The macro is defined as follows, feel free to adopt or adapt it for your needs: (meta; it; i~file; i~class; i~arch; i~lang; rh; iS md5,entropy; ih~cmd~!cmdsize; il; izz | grep -e Go\ build\ ID -we upx;) Within the .(meta) macro, notice the command sequence ih~cmd~!cmdsize. This warrants a little explanation. Readers of our previous posts on r2 and macOS malware may recall that the tilde is r2’s internal grep function. The tilde followed by an exclamation mark ~!<expression> filters out the given expression, equivalent to grep -v. You can see the difference in the following image.
Filtering wanted and unwanted information with r2’s ~ command
Moreover, note that the .(meta) macro calls out to the system grep utility as well. The ability to utilize any command line utility on the system from within r2 is one of its major advantages over other reversing platforms.
Passing Arguments to radare2 Macros - Many of the things you can do with macros you could also do with Aliases, and vice versa; it’s largely a matter of personal preference. However, note that macros have one neat superpower – you can pass arguments to them.
Here’s a good example: r2 has a command for diffing or comparing code within a sample, either as hex or disassembly (cc and ccd). For some reason (I’m sure there’s a perfectly good one), this function counterintuitively displays the output from the first address given to the right of the output from the second address given. We can ‘correct’ this with a macro that takes the addresses as arguments but swaps their order when it passes them to cc. (diffs x y; cc $1 @ $0)
The cc command places the output of the first address to the right of the second address. The .(diffs) macro fixes this
Incidentally, the cc command (or our reimplementation of it in a macro) can be very useful for finding common code within samples when writing YARA or other hunting rules, a topic we’ll discuss a bit further below.
Finding IP Address Patterns and Other Useful Artifacts - To find IP address patterns and other useful artifacts in a binary, you can create macros with search regexes. Here’s a few examples to get your started.
Find IP Address Patterns: (ip; /e /\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}/)
A sample of Atomic Stealer quickly gives up its C2 with the help of the .(ip) macro
Find Interesting Strings - Search for places where an executable gathers user and local environment information. (reg; /e /home/i; /e /getenv/i; /e /Users/)
You can automate different searches for XOR instructions with the following r2 macro: (xor ; f~xor | sort -k 2 -n; /e /xor byte/i; izz~+xor)
The LockBit for Mac ransomware uses an XOR key of 0x39
Testing a File Against Local YARA Rules - For the following two macros, you will need YARA installed locally on the host. This can be done with MacPorts, Homebrew or by installing from Github and following the instructions here. With YARA installed, it is easy to call it from within r2 to see if a rule you’ve created for a sample will fire. This is a great way to develop and test rules on the fly as you triage new samples. On my analysis machines, I have my rules stored in a subdirectory of /usr/local/bin, so my macro looks like this: (yara; !yara -s /usr/local/bin/scan_machos/myyara.yara `o.`)
As yara is an external command, it is prefixed by an exclamation point !. This is how to tell the r2 shell that we want to call an external command line utility, a very useful feature that allows you to bring in all the power of the command line utilities at your disposal directly into r2. The -s option allows us to see which strings hit (and how many times). See man yara for more options. The `o.` command at the end of the macro is an r2 command that returns the file name of the currently loaded binary.
A simple YARA rule to detect Geacon samples called from the r2 command line
Since Apple’s own built-in malware blocking tool XProtect also uses YARA rules, you can create a macro to see whether Apple has a rule for your sample. To create an .(xp) macro to check files against Apple’s XProtect database signatures file (remember: YARA must be installed first), use the following macro: (xp; !yara -w /Library/Apple/System/Library/CoreServices/XProtect.bundle/Contents/Resources/XProtect.yara `o.`)
Don’t be surprised, however, if you don’t get many matches: XProtect’s YARA signature database is thin at best.
Print Your Customizations when radare2 Starts Up - By now, you might be starting to collect quite a list of macros and aliases. How to remember them all? There’s a couple of built-in ways, and we’ll also look at one last .radare2rc customization to help us out with this, too. From within, r2 you can see all defined aliases and macros by typing $* and (*, respectively.
Printing out aliases and macros with their values
We can also have r2 print our entire config file when it starts up by adding a further customization. At the end of the .radare2rc file, try something like this: echo ENV: ; !cat -v /Users//.radare2rc | sed -e '$ d'; echo;
The sed command after the pipe prevents the last line of the file from being printed; an optional customization you can ignore if you wish. You could also just add the $* and (* commands above to the config file instead, but I like to see the whole file as a reminder of the entire environment.
It can be helpful to automatically print the entire config file out as r2 starts up
These examples should be enough to get you started creating useful aliases and macros to help speed along your own analysis.
How to Diff Binaries and Binary Functions with radare2 Aliases and macros are useful shortcuts, the command line equivalent to GUI apps’ hotkeys and key chords, but there are other, more powerful ways we can customize radare2 and drive it with custom functions and scripts.
As an example, let’s add the following function to our shell config file
(e.g., ~/.zshrc or ~/.bashrc): rfunc() {
radiff2 -AC -t 100 $1 $2 2> /dev/null | egrep --color "\bUNMATCH\b|$"
}
This leverages a radare2 tool called radiff2. This tool (among a bunch of others) is installed as part of the radare2 suite. With the function added to our shell config, we’ll start a new Terminal session and call the function directly from the command line rather than from within r2. The rfunc() function tells us which functions match, which do not, and which are new between any two given binaries. Here’s part of the output from two very different variants of Atomic Stealer:
Two variants of Atomic Stealer. The sendlog function exfiltrates user data
To get a graphical output of how two functions differ, let’s begin by using radiff2 directly. This utility has many options and we’ll only explore a few here, but it is well worth digging into deeper. You can compare two functions or offset addresses in two binaries with the following syntax: $ radiff2 -g offset1,offset2 file1 file2 Or, in case both binaries use the same function name, e.g., sym._main.sendlog in our example above, you can simply provide the function name instead of the addresses: $ radiff2 -g <function_name> file1, file2 In this example, I’ll compare the main function of two samples of Genieo adware.
Genieo samples of varying sizes
As shown in the image above, the files are quite different sizes.
$ radiff2 -g main a1219451eacd57f5ca0165681262478d4b4f829a7f7732f75884d06c2287ef6a 80573de5d79f580c32b43c82b59fbf445b91d6e106b3a4f2f67f2a84f4944433
Partial output of radiff2’s graphical diff engine
However, the output shows us that the main functions are structured identically and differ only in terms of offset addresses and certain hard coded values. This kind of information is extremely helpful for creating effective signatures for a malware family. As radiff2 outputs to the Terminal, display can sometimes be tricky. It’s possible to leverage Graphviz and the dot and xdot utilities to produce more readable graphs. Though a deep dive into Graphviz takes us beyond the scope of this post, try installing xdot from brew install xdot and playing around with options such as these: $ radiff2 -md -g <function_name> file1 file2 | xdot - As xdot is Python based, I’ve found it can sometimes be temperamental when it comes to escaping strings passed from radiff2 and occassionally spits out “unknown op code” errors. When this happens, one of a few ways you can sidestep xdot and Python is as follows: $ radiff2 -md -g <function_name> file1 file2 > main.dot
$ dot -Tpng main.dot -o main.png
$ open main.png
These can produce graphical diffs such as the following:
Of course, once you hit on one or more graph workflows that work for you, you can then add them as functions to your shell config file for maximum convenience.
Here’s an example:
rdiff () {
if [ "$#" -eq 4 ]
then
radiff2 -A -md -g -t 100 $1,$2 $3 $4 2> /dev/null | tail -n +28 | sed 's/fillcolor="lightgray"/fillcolor="lightblue"/g' | sed 's/fillcolor="yellow",color="black"/fillcolor="#F4C2C2",color="lightgray"/g' | sed 's/"Courier"/"Poppins"/g' | sed 's/color="black"/color="lightgray"/g' | xdot -
elif [ "$#" -eq 3 ]
then
radiff2 -A -md -g -t 100 $1 $2 $3 2> /dev/null | tail -n +28 | sed 's/fillcolor="lightgray"/fillcolor="lightblue"/g' | sed 's/fillcolor="yellow",color="black"/fillcolor="#F4C2C2",color="lightgray"/g' | sed 's/"Courier"/"Poppins"/g' | sed 's/color="black"/color="lightgray"/g' | xdot -
else
echo "Wrong number of arguments supplied."
fi
}
This function allows you to specify either three args (a function name, and two filepaths) or four (two offsets, two filepaths); beware there’s minimal error checking. Two other things of note: via the -A option, radiff2 passes the files to r2 for analysis. This can improve radiff2‘s diffing output. However, recall that our earlier customization has r2 print out our config file when it runs. We don’t want this output passed to xdot (or dot) or it will cause errors. In my case, my .radare2rc file is 27 lines long, so I use tail -n +28 to start printing from the 28th line. That number will need to be adjusted for the length of your own .radare2rc config file, and you’ll need to remember to adjust the function if you later edit the config file such that it changes length either way. Secondly, note the series of sed commands. These are a quick and dirty way to alter the default colors of the output, so adjust or remove to your liking.
Conclusion: In this report Sentinel has seen how we can power up radare2 by means of aliases, macros and functions. Researchers learned how these shortcuts and automations can allow us to make r2 easier and more productive to use. That is not all there is to powering up radare2, however, as researchers have yet to explore driving radare2 with scripts via r2pipe to do deeper analysis, decrypt strings and other advanced functions.
Dark Frost - Web infrastructure company Akamai’s Security Intelligence Response Team has discovered a new botnet targeting the gaming industry with DDoS attacks. Akamai security researcher Allen West explained that they had dubbed this botnet Dark Frost. Per their analysis, this botnet is similar to several previously discovered botnets and malware strains, including Qbot, Gafgyt, and Mirai. Researchers believe Dark Frost was created using stolen code from these strains to allow attackers to carry out DDoS attacks successfully.
Akamai flagged the botnet in February 2023, but they believe the attacker has been active since May 2022. When Akamai researchers reverse-engineered the botnet, its potential was reported at 629.28 Gbps via a UDP flood attack. The first binary sample was collected on February 28 in Akamai SIRT’s HTTP Honeypots. Reportedly, the threat actor targeted misconfigurations in Hadoop YARN servers, which enabled them to conduct remote code execution. This YARN misconfiguration has existed since 2014 but has yet to be assigned a CVE, so attackers can trick the server into downloading/running their malicious binary.
Prominent Targets - According to Akamai’s blog post, the most prominent targets of Dark Frost include gaming companies, online streaming services, game server hosting providers, and gaming community members. Researchers noted that the attacker has directly interacted with these members. Researchers could not determine the exact motive of this campaign, but they suspect it is geared toward attention-seeking. Interestingly, the threat actor has even published live recordings of the attacks. They have also been boasting about these attacks on social media, too, claiming they used the botnet to settle scores with adversaries and leave digital signatures on binary files. The actor has also created a Discord channel to offer DDoS services in exchange for money, which indicates this campaign could also be financially motivated.
The author of the Dark Frost botnet is bragging about a successful attack on Rogue Company servers. (Image: Akamai)
Rapidly Increasing Army of Bots - Typically, botnets comprise hundreds and thousands of compromised devices located worldwide. In Dark Frost’s case, it has included hundreds of compromised devices within a short period. Until February 2023, this botnet had 414 compromised machines running different instruction set architectures, including x86, ARMv4, ARM7, MIPSEL, and MIPS.
GLOBAL TRENDS:
Spain - major lender in Spain said it is dealing with a ransomware attack affecting several offices. Globalcaja, based in the Spanish city of Albacete, has more than 300 offices across Spain and serves nearly half a million people with a variety of banking services. It manages more than $4.6 billion in consumer loans and has 1,000 employees. The Play ransomware group claimed this week that it attacked the bank and stole an undisclosed amount of private and personal confidential data, client and employee documents, passports, contracts and more. The bank published a statement last week confirming that computers at several local offices were dealing with ransomware. “It has not affected the transactions of the entities (nor the accounts or the agreements of clients.) The offices are operating with total normality when it comes to electronic banking and ATMs,” they said in a statement.[2] “From the very beginning, at Globalcaja we activated the security protocols created for this purpose, which led us to disable some office posts and temporarily limit the performance of some operations. We continue to work hard to finish normalizing the situation and are analyzing what happened, prioritizing security at all times. We apologize for any inconvenience caused.”
The company did not respond to requests for comment about whether a ransom will be paid. Spanish financial institutions have long been a target for hackers but the country has been dealing with more ransomware incidents in 2023, with one attack crippling a hospital in Barcelona and another bringing down a Spanish amusement park company. The Play ransomware gang first emerged in July 2022 targeting government entities in Latin America, according to Trend Micro, and most recently drew headlines for a damaging attack on the City of Oakland, which has spent weeks recovering from the incident. The group has also attacked the Massachusetts city of Lowell as well as several companies across Europe.
Shiba Inu - The cryptocurrency niche has come a long way since Bitcoin’s inception, and it is now far from the digital alternative to fiat currency than it was once intended to be and one of the most prevalent indicators of this is the rise of meme coins. The likes of Dogecoin set a precedent for bringing lightheartedness into a very serious niche and Shiba Inu is one of the more successful names to enter the fray. Designed for a more tongue-in-cheek approach to both Doge and digital finance in general, it aimed to create a community-driven, cult-like following without breaking the bank.[3]
A little more about Shiba Inu - While Shiba Inu may look like just another joke coin, it powers an open-source ecosystem that plays host to many decentralized applications (known as DApps), products and even platforms that allow users and enthusiasts to create smart contracts using the widely popular Ethereum blockchain.
Price predictions for Shiba Inu - When it comes to Shiba Inu price predictions, there is a lot to consider before coming to an understanding of whether this meme coin can really reach the coveted $1 value that experts have been hoping for. Late 2022 saw SHIB reaching its top potential so far, at an unprecedented $0.00008845 – and this gave traders and investors some hope for 2023. Industry insiders are predicting a potential maximum of $0.0000091, but the minimum could fall to as low as $0.0000220. These predictions are led by considerations of technological innovations as well as market trends, and these can give important insights into where things are likely to fall over the coming years.
SHIB price prediction 2024 – 2030: In less than a year’s time, the average trading price is set to be around $0.00003041. This is taking the growing popularity of the Metaverse platform into consideration and the fact that it will increase usage across the crypto niche. As a bullish market is thematic through 2024, Shiba Inu is expected to reach as much as $0.00004335 in 2025, $0.00007480 in 2026, $0.00010739 in 2027, $0.00016276 in 2028, $0.00021284 2029 and eventually reaching $0.00035649 by 2030.
Should you invest in SHIB in 2023 and beyond? The above predictions seem to show that the meme coin will continue to see stable growth, but an influx in buyers will certainly push things forward in terms of significantly improving value growth. These numbers could better serve as an indicator of the quality and volume of investors that are likely to come into the wider ecosystem.
Estonia - The International Criminal Court should not allow those who commit war crimes or crimes against humanity in cyberspace to escape international justice, said the President of Estonia Alar Karis at a conference on cyber conflict last week. These attacks must always come at a cost to the attacker and imposing those costs will require nations to cooperate and collectively blame the perpetrators, said Karis, opening the 15th annual International Conference on Cyber Conflict (CyCon) in Tallinn.[4] “This is about ensuring justice, but also strengthening deterrence by punishing those who violate the most sacred international laws and norms,” the Estonian president said.
He spoke in the wake of numerous cyber and kinetic attacks targeting civilian infrastructure during the Russian invasion of Ukraine, including dozens of critical cyber incidents targeting the country's energy sector last winter, when the daily mean temperature throughout most of the country is below freezing. “In Ukraine, as in other armed conflicts, we should not think of cyberattacks during armed conflict as something separate from the rest of the military campaign,” said Karis, who added that the amount of distributed denial-of-service (DDoS) attacks targeting Estonia had increased by 300% in 2022.
Back in 2007, just a few years after joining NATO, Estonia was impacted by a wave of such DDoS attacks when it relocated a Soviet war memorial from the center of the capital Tallinn to a military cemetery a few kilometers away. Officials blamed Russia for the incidents, although NATO did not issue a formal attribution.
[1] https://www.sentinelone.com/labs/radare2-power-ups-delivering-faster-macos-malware-analysis-with-r2-customization/
[2] https://therecord.media/spain-globalcaja-bank-confirms-ransomware-attack/
[3] https://www.hackread.com/shiba-inu-meme-coin-open-source-ecosystem/
[4] https://therecord.media/war-crimes-cyberspace-cycon-estonia-president-alar-karis/