So this past month I have set up the Wazuh fork of Ossec across my infrastructure and have begun to play with its capabilities. Part of my infrastructure includes web servers, and I was happy to see while reviewing the alert feed some nice detection for Web attacks in the Wazuh ruleset. Specifically the rules I’ve been looking at are:
rule.id: "31104" "Common web attack." rule.id: "31515" "PHPMyAdmin scans (looking for setup.php)." rule.id : "31516" "Suspicious URL access."
These provide some good idea on standard types of attacks on web applications. So taking these alerts I built a dashboard to look specifically at these.
While getting the dash together I found a number of similar web requests hitting the server:
The pattern matches up with a known vulnerability in AVtech cameras.
With some help of Cyber chef we can extract the part of the urls pointing to the malware down loaders.
Now we can easily see where the next stage of the attacks are hosted. From there we can look at avtech and dlink, so some routers being targeted along with the IP cameras.
Looking at those files we find that they are scripts to download the malware meant to be deployed.
Unfortunately I was unable to get the malware directly, but was able to track it down via virustotal and hybrid-analysis.
I was able to get a sample of sefa.arm, but the dlink malware I was not able to get a direct sample. So with this data I added signatures for the down loader scripts and borrowed the sigs from clamAV for blazescan. (Thank you Talos for making it so easy to review the clamAV sigs!)
Now time for the IOC’s
126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124
126.96.36.199 188.8.131.52 184.108.40.206
sefa.arm sefa.mpsl sefa.mips 3e515a112014ec5b19cee9dd77f940766376fa81b61a584411ae37ba972efef6 e088f2899ed72652bda179222faaed8607441bb777877df342c99fab15a96a4c 01c3b9b25beca2d11006e416294ad3f54b54100fda9c2720704314655a5328c7
http://220.127.116.11/Botnet.mips http://18.104.22.168/Botnet.mpsl http://22.214.171.124/Botnet.sh4 http://126.96.36.199/Botnet.x86 http://188.8.131.52/Botnet.arm6 http://184.108.40.206/Botnet.x86_64 http://220.127.116.11/Botnet.ppc http://18.104.22.168/Botnet.m68k http://22.214.171.124/Botnet.sparc http://126.96.36.199/Botnet.arm4 http://188.8.131.52/Botnet.arm5 http://184.108.40.206/Botnet.arm7 http://220.127.116.11/Botnet.dbg http://18.104.22.168/bins/sefa.mpsl http://22.214.171.124/bins/sefa.mips http://126.96.36.199/bins/sefa.arm
User Agent String
Have questions find me on twitter @laskow26.