导语:DDG挖矿病毒是一款在Linux系统下运行的恶意挖矿病毒,该病毒从去年一直活跃在现在,已经挖取了价值一千多万人民币的虚拟币货币,此病毒样本在一年左右的时间,已开发出了多个变种样本,此次发现的为DDG.3012/DDG3013挖矿版本。

一、样本简介

深信服EDR安全团队,最近接到一例Linux的挖矿病毒样本,经确认此病毒样本为DDG挖矿病毒最新的变种样本。

DDG挖矿病毒是一款在Linux系统下运行的恶意挖矿病毒,该病毒从去年一直活跃在现在,已经挖取了价值一千多万人民币的虚拟币货币,此病毒样本在一年左右的时间,已开发出了多个变种样本,此次发现的为DDG.3012/DDG3013挖矿版本。

二、详细分析

1.获取系统CPU型号,然后判断程序是否可以运行,如下:

图片1.png

CPU型号不符合程序运行环境,则退出程序,如下:

图片2.png

2.样本运行之后,会通过8000端口依次连接恶意IP列表中的IP地址,检测是否可以访问,如下:

图片3.png

然后再发送HTTP请求给相应的IP地址,请求URL为http://C2:8000/slave,如下:

图片4.png

相应的数据包请求顺序,如下:

图片5.png

如果C2地址存活,则通过HTTP下载相应的挖矿程序的配置文件脚本,如下:

图片6.png

下载回来的配置文件,调用MsgPack程序进行格式化处理,如下:

图片7.png

3.获取解析下载回来的MsgPack配置文件,然后根据配置文件中的信息,执行里面包含一个sh脚本文件,sh脚本内容如下:

图片8.png

sh脚本的作用,主要有三个作用:

(1)下载远程服务器上的i.sh脚本,并同步写入到本地crontab

(2)下载最新的DDG样本DDGS样本到本地并执行

(3)检测其它版本的挖矿进程,并结束相关进程

4.相应的恶意服务器上的DDGS最新的恶意样本文件,如下:

图片9.png

5.通过配置文件信息,从恶意C2服务器http://149.56.106.215:8000/static/qW3xT.2

上下载相应的挖矿程序,到临时目录下的qW3XT.2,如下:

图片10.png

挖矿程序使用的代码IP地址为:104.197.211.117,如下:

图片11.png

相应有矿池地址,如下:

图片12.png

hk02.supportxmr.com
pool.supportxmr.com
xmr-asia1.nanopool.org
xmr-us-west1.nanopool.org

钱包地址,如下:

图片13.png

42d4D8pASAWghyTmUS8a9yZyErA4WB18TJ6Xd2rZt9HBio2aPmAAVpHcPM8yoDEYD9Fy7eRvPJhR7SKFyTaFbSYCNZ2t3ik

6.DDGS恶意样本还会通过内置的Redis扫描程序,对Redis服务进行扫描,通过相应的用户名和密码进行暴破,如下:

图片14.png

扫描相应的端口号分别为:7379,6380,6379

暴力破解使用的密码字典如下:

图片15.png

7.暴力破解获取的相应的流量信息,如下:

8.内置的相应的ssh操作,如下:

图片18.png

写入SSH公钥获取操作系统权限,注入SSH公钥,如下:

图片19.png

9.DDGS母体会扫描内置在程序中的IP地址列表,IP地址列表,一共有一百多个,如下:

47.52.114.47:8000

47.52.159.33:8000

47.52.35.111:8000

47.52.39.221:8000

47.52.57.128:8000

47.52.67.132:8000

47.52.93.206:8000

47.90.80.240:8000

47.91.128.19:8000

47.91.157.93:8000

47.91.46.128:8000

47.92.107.57:8000

47.92.124.17:8000

47.92.26.122:8000

47.92.81.119:8000

47.93.217.93:8000

47.93.38.172:8000

47.93.44.104:8000

47.93.83.123:8000

47.94.103.17:8000

47.94.136.56:8000

47.94.20.119:8000

47.94.201.42:8000

47.94.22.148:8000

47.94.235.16:8000

47.94.249.13:8000

47.94.81.156:8000

47.96.22.210:8000

58.58.34.221:8000

61.91.81.253:8000

14.140.232.55:8000

182.162.73.58:8000

199.233.62.78:8000

210.73.214.34:8000

39.106.50.146:8000

39.108.127.54:8000

39.108.132.64:8000

39.108.82.141:8000

43.254.240.20:8000

47.52.113.241:8000

47.88.218.199:8000

47.88.219.207:8000

47.90.123.173:8000

47.92.120.192:8000

47.92.143.114:8000

47.93.193.231:8000

47.93.220.124:8000

47.93.228.207:8000

47.93.254.136:8000

47.94.145.206:8000

47.94.209.243:8000

47.95.113.179:8000

47.95.118.224:8000

47.95.200.188:8000

47.95.232.167:8000

47.95.236.151:8000

47.95.250.157:8000

50.117.38.191:8000

51.15.137.192:8000

52.79.148.234:8000

58.68.229.118:8000

59.110.218.75:8000

61.160.249.77:8000

69.25.149.164:8000

101.132.110.238:8000

101.200.193.158:8000

104.197.211.117:8000

112.215.141.101:8000

114.115.140.118:8000

118.228.152.210:8000

121.196.198.126:8000

123.157.223.229:8000

123.207.100.153:8000

124.192.161.178:8000

165.225.157.157:8000

165.227.149.151:8000

180.153.158.233:8000

180.153.158.235:8000

182.254.221.254:8000

203.159.249.211:8000

101.201.232.44:8000

106.14.122.242:8000

106.15.191.118:8000

115.144.217.74:8000

115.159.27.108:8000

116.62.232.185:8000

118.190.157.79:8000

118.89.151.186:8000

119.28.177.210:8000

119.29.108.152:8000

120.77.152.189:8000

120.77.212.106:8000

120.92.104.116:8000

121.40.119.134:8000

123.207.166.84:8000

123.207.235.25:8000

123.30.240.102:8000

13.113.240.221:8000

139.196.198.33:8000

139.224.232.93:8000

140.143.140.37:8000

149.56.106.215:8000

203.250.126.27:8000

218.248.40.228:8000

60.205.226.170:8000

61.131.207.178:8000

61.131.207.179:8000

124.192.161.178:8000

165.225.157.157:8000

165.227.149.151:8000

180.153.158.233:8000

180.153.158.235:8000

182.254.221.254:8000

203.159.249.211:8000

101.201.232.44:8000

106.14.122.242:8000

106.15.191.118:8000

115.144.217.74:8000

115.159.27.108:8000

116.62.232.185:8000

118.190.157.79:8000

118.89.151.186:8000

119.28.177.210:8000

119.29.108.152:8000

120.77.152.189:8000

120.77.212.106:8000

120.92.104.116:8000

121.40.119.134:8000

123.207.166.84:8000

123.207.235.25:8000

123.30.240.102:8000

13.113.240.221:8000

139.196.198.33:8000

139.224.232.93:8000

140.143.140.37:8000

149.56.106.215:8000

203.250.126.27:8000

218.248.40.228:8000

60.205.226.170:8000

61.131.207.178:8000

61.131.207.179:8000

106.75.64.239:8000

110.10.189.61:8000

115.28.172.42:8000

115.28.235.58:8000

119.28.177.76:8000

119.28.49.163:8000

119.29.193.70:8000

119.29.197.51:8000

119.29.203.39:8000

119.29.38.107:8000

119.29.40.143:8000

120.25.66.201:8000

120.27.157.48:8000

120.55.57.107:8000

120.92.146.42:8000

121.41.128.10:8000

123.56.17.198:8000

14.140.232.55:8000

182.162.73.58:8000

三、相关IOC

MD5

E31C1D7A8025E7C3266A07E37C55A4BA

7FB5665A632FE3F91C65DF960EF56D9F

0A63E48163056B04BF1D48420B7C8150

C2

149.56.106.215:8000

URL

http://149.56.106.215:8000/i.sh

http://149.56.106.215:8000/static/3012/ddgs.i686

http://149.56.106.215:8000/static/3012/ddgs.x86_64

http://149.56.106.215:8000/static/3013/ddgs.i686

http://149.56.106.215:8000/static/3013/ddgs.x86_64

http://149.56.106.215:8000/static/qW3xT.2

四、清除方案

1.查找相应的挖矿程序,如下:

图片20.png

然后删除相应的恶意程序,在临时目录下/tmp/qW3xT.2、/tmp/ddgs.3013、/tmp/ddgs.3012、

/tmp/wnTKYg、/tmp/2t3ik等文件

2.结束掉挖矿和DDG母体相关进程,如下:

ps -ef | grep -v grep | egrep 'wnTKYg|2t3ik|qW3xT.2|ddg' | awk '{print $2}' | xargs kill -9

3.清除到定时任务,相应的定时任务文件:

/var/spool/cron/root
/var/spool/cron/crontabs/root
源链接

Hacking more

...