{"id":109522,"date":"2023-04-13T08:00:32","date_gmt":"2023-04-13T08:00:32","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=109522"},"modified":"2023-04-12T17:03:04","modified_gmt":"2023-04-12T17:03:04","slug":"crimeware-report-uncommon-infection-methods-2","status":"publish","type":"post","link":"https:\/\/securelist.com\/crimeware-report-uncommon-infection-methods-2\/109522\/","title":{"rendered":"Uncommon infection methods\u2014part 2"},"content":{"rendered":"
Although ransomware is still a hot topic on which we will keep on publishing, we also investigate and publish about other threats. Recently we explored the topic of infection methods, including malvertising<\/a> and malicious downloads. In this blog post, we provide excerpts from the recent reports that focus on uncommon infection methods and describe the associated malware.<\/p>\n For questions or more information on our crimeware reporting service, please contact crimewareintel@kaspersky.com<\/a>.<\/p>\n RapperBot, based on Mirai (but with a different C2 command protocol), is a worm infecting IoT devices with the ultimate goal to launch DDoS attacks against non-HTTP targets. We observed the first sample in June 2022, when it was targeting SSH and not Telnet services. The latest version, however, removed the SSH functionality part and now focuses exclusively on Telnet\u2014and with quite some success. In Q4 2022, we noticed 112k RapperBot infection attempts coming from over 2k unique IP addresses.<\/p>\n What sets RapperBot apart from other worms is its “intelligent” way of brute forcing: it checks the prompt and, based on the prompt, it selects the appropriate credentials. This method speeds up the brute forcing process significantly because it doesn’t have to go over a huge list of credentials.<\/p>\n RapperBot then determines the processor architecture and infects the device. The downloading of the actual malware is done via a variety of possible commands (for example, wget, curl, tftp and ftpget). If for some reason these methods don’t work, then a malware downloader is uploaded to the device via the shell “echo” commands.<\/p>\n Rhadamanthys is a new information stealer first presented on a Russian-speaking cyber criminal forum in September 2022 and offered as a MaaS platform. According to the author, the malware:<\/p>\n Despite the malware being advertised already in September 2022, we started to detect the first samples at the beginning of 2023. Although Rhadamanthys was using phishing and spam initially as the infection vector, the most recent method is malvertising.<\/p>\n Online advertising platforms offer advertisers the possibility to bid in order to display brief ads in search engines, such as Google, but also websites, mobile apps and more. Both search engine and website-based ad platforms are leveraged by Rhadamanthys. The trick they pull is to display ads representing legitimate applications but in fact containing links to phishing websites. These phishing websites contain fake installers, luring users into downloading and installing the malware.<\/p>\n While analyzing Rhadamanthys, we noticed a strong connection with Hidden Bee<\/a> miner. Both samples use images to hide the payload inside and both have similar shellcodes for bootstrapping. Additionally, both use “in-memory virtual file systems” and utilize Lua to load plugins and modules.<\/p>\nRapperBot: “intelligent brute forcing”<\/h2>\n
Rhadamanthys: malvertising on websites and in search engines<\/h2>\n
\n