{"id":109522,"date":"2023-04-13T08:00:32","date_gmt":"2023-04-13T08:00:32","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=109522"},"modified":"2023-04-12T17:03:04","modified_gmt":"2023-04-12T17:03:04","slug":"crimeware-report-uncommon-infection-methods-2","status":"publish","type":"post","link":"https:\/\/securelist.com\/crimeware-report-uncommon-infection-methods-2\/109522\/","title":{"rendered":"Uncommon infection methods\u2014part 2"},"content":{"rendered":"

Introduction<\/h2>\n

Although ransomware is still a hot topic on which we will keep on publishing, we also investigate and publish about other threats. Recently we explored the topic of infection methods, including malvertising<\/a> and malicious downloads. In this blog post, we provide excerpts from the recent reports that focus on uncommon infection methods and describe the associated malware.<\/p>\n

For questions or more information on our crimeware reporting service, please contact crimewareintel@kaspersky.com<\/a>.<\/p>\n

RapperBot: “intelligent brute forcing”<\/h2>\n

RapperBot, based on Mirai (but with a different C2 command protocol), is a worm infecting IoT devices with the ultimate goal to launch DDoS attacks against non-HTTP targets. We observed the first sample in June 2022, when it was targeting SSH and not Telnet services. The latest version, however, removed the SSH functionality part and now focuses exclusively on Telnet\u2014and with quite some success. In Q4 2022, we noticed 112k RapperBot infection attempts coming from over 2k unique IP addresses.<\/p>\n

What sets RapperBot apart from other worms is its “intelligent” way of brute forcing: it checks the prompt and, based on the prompt, it selects the appropriate credentials. This method speeds up the brute forcing process significantly because it doesn’t have to go over a huge list of credentials.<\/p>\n

RapperBot then determines the processor architecture and infects the device. The downloading of the actual malware is done via a variety of possible commands (for example, wget, curl, tftp and ftpget). If for some reason these methods don’t work, then a malware downloader is uploaded to the device via the shell “echo” commands.<\/p>\n

Rhadamanthys: malvertising on websites and in search engines<\/h2>\n

Rhadamanthys is a new information stealer first presented on a Russian-speaking cyber criminal forum in September 2022 and offered as a MaaS platform. According to the author, the malware:<\/p>\n