

Rewterz Threat Alert – Amadey Botnet – Active IOCs
August 24, 2023
Rewterz Threat Alert – PatchWork APT Threat Actor Group – Active IOCs
August 24, 2023
Rewterz Threat Alert – Amadey Botnet – Active IOCs
August 24, 2023
Rewterz Threat Alert – PatchWork APT Threat Actor Group – Active IOCs
August 24, 2023Severity
High
Analysis Summary
The Mirai botnet is a type of malware that infects Internet of Things (IoT) devices, such as routers, security cameras, and other smart devices, in order to launch distributed denial-of-service (DDoS) attacks. The botnet was first discovered in August 2016 and quickly gained notoriety for its ability to launch some of the largest DDoS attacks ever recorded, including an attack that took down the DNS provider Dyn.
Mirai works by scanning the internet for devices that use default or easily guessable passwords, such as “admin” or “password”. Once a vulnerable device is identified, the malware infects it and adds it to the botnet, which can then be used to launch DDoS attacks on a target.
Mirai is particularly effective because it is able to exploit the large number of poorly secured IoT devices that are connected to the internet. This makes it difficult to defend against, as many of these devices have limited processing power and memory, and may not receive regular security updates.
Since its discovery, Mirai has continued to evolve and new variants of the malware have been detected. The best defense against Mirai is to ensure that IoT devices are properly secured, with strong passwords and regular security updates. Network administrators can also use tools to monitor for unusual traffic patterns that may indicate a DDoS attack is underway.
Impact
- Server Outage
- Data Loss
- Website Downtime
Indicators of Compromise
IP
- 103.118.30.99
- 103.212.81.116
- 109.98.208.52
- 185.225.75.59
- 193.42.32.30
- 194.55.224.49
- 45.138.74.83
- 45.95.169.101
- 5.180.181.86
- 78.142.228.125
MD5
- 00f8a86d9f42b29da3f9248982f1d93f
- 050b4af23deb112b8e6fca5e5ae93e3d
- 051bd3748435b58704bee33257f2d3b9
- 0865ad1400fdd3a2e9e9c8e13fabd7d3
- 09251e06cb184791782b90962c390f59
- 0c154dc91bf033b761b628cc7f6f9bd2
- 0cac72ef92fd72e225fcf09fceebcf47
- 16b0aa30e42463d584c37c9066edbe43
- 184d21d22c31453be7067ab362229d51
- 1da7b71decaaa56b3ec22fe53049efb0
- 1e53a1a8608399ef8d599e90bf291f16
- 22a80c9563c16dc32d867ade21daffe7
- 28192126feb654a0488e2b8e3078334e
- 318db48b9874b16e0b363bb2b506c5f6
SHA-256
- 14cfdb068f93f63862d4566b72e166ec17a03a5ce899d8fb310052cad6d3fc53
- 481582729aff7a014028616adea1bffc496e52f2c559d2047c68b9691d32eb39
- ba62729fb15d1baae0d0ce633f99a3324297e7d30c75e03e98a1dc5f41c8faa6
- c445bf4cb92390c26ee9d9465289508f36b7c17827eb7aa8f9da10059d5ea2f3
- 13e14a114b65bb65f65321ff6631c0998d07b22e6a0ce6edcd1f320958a17e9a
- ec92295c61d15f6d3ecee001fa4d85b4cd66ba788fc71a68f496da587fa42c78
- 524b16a07439aa8c8ce96e94850c2108f203bf8f6d9ed41c177fe3fd84436831
- d9c994e754bf65ec938d4ea3d86e20b08c5f568fb5fb835f1c2bc73c641b4a26
- 34d946a69413cc402589f2fa66e70c10317f53ec3d52663c72d87838349c3cb7
- 59f9627e078628c03a4b8eb6a288c408f69e31550bdd5ef2cdc4c5122fcc3c09
- fac608995cb26410fb63b4559da4066fdce43947ed15e84754afdd9f13724fc7
- 47bb56686b7c2a5164ac5373d0ca1340aa183cec20d7edc8786a0f537642e96e
- fd02bb379ed2e77c2f6936954c89bb633ec535915643cfc09f257206d2ca308a
- d98bd614a7d8f4f06ac392b1531e9e72ec93603dc490c629b50c4dec016d3e1f
SHA-1
- 6b2f8633cfa278b74a1ff4f0ffd558a01b699150
- 6f0d0dcf44a8e6873c9d11050ab8c76c0bcd5dee
- c510c0445e3e329931e5efc2c5a3243e608f192d
- db56fed0a4bd182a19393f0636edd074b742fc27
- a603b14aeb5c079401c120237231f6174816dad7
- 2f001c3593fb625948163424b42db45e56721eb9
- 68fb1499ebca08792d40b1dd509f8d63fffaf11d
- ad0d5c0f2906825031ab44d6887fdbd6d883125d
- 38179e0bc6be440e9dcba50b4258737bd78bd1f3
- 3bd2fecb3e614dc7dd3f6b3b09787e792d2de876
- a348534c3b8950f90b480c1a1de5db762b4211df
- a3cdfe532adfca2924f973b1854b532535a111b6
- 1b23a70262ca23f69fa008defc36d8b6a3d9dfbb
- 74bd44ed8e4f031a84b9188c6df3bbcef86578d0
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders