Zerobot Malware – 08 December 2022

Zerobot is a Go-Based Malware that has been observed targeting devices like F5 Big-IP, Zyxel Firewalls, spring4Shell, and phpMyAdmin with almost two dozen vulnerability exploits. The Botnet’s objective is to add compromised devices to its pool to launch DDoS attacks and execute arbitrary commands. 

The malware targets several system architecures including i386, AMD64, ARM, ARM64, MIPS, MIPS64, MIPS64le, MIPSle, PPC64, PPC64le, RISC64, and S390x.

1- Initialization:

• Once a system is exploited, Zerobot checks its connection to the internet by using Cloudflare’s DNS resolver server.

• Zerobot copies itself to the “Startup” folder for windows. However, Linux has three file paths “%HOME% “, “/etc/init/”, and “/lib/systemd/system/” based on the startup method.

• The malware prevents users from terminating the program’s process by intercepting any termination signals.

2- Functions:

• After establishing a connection to the compromised device, Zerobot connects to its C2 via WebSocket protocol. 

• Zerobot C2s use the following commands to control the bots:

Command

Details

ping

Heartbeat, maintaining the connection

attack

Launch attack for different protocols: TCP, UDP, TLS, HTTP, ICMP

stop

Stop attack

update

Install update and restart Zerobot

enable_scan

Scan for open ports and start spreading itself via exploit or SSH/Telnet cracker

disable_scan

Disable scanning

command

Running OS command, cmd on Windows and bash on Linux

kill

Kill botnet program

 

Indicators of Compromise

Indicators of compromise will be shared with EG-FinCIRT’s Constituents

Vulnerabilities

• CVE-2014-08361

• CVE-2022-01388 

• CVE-2017-17106 

• CVE-2017-17215 

• CVE-2018-12613

• CVE-2020-10987 

• CVE-2020-25506 

 • CVE-2021-35395 

 • CVE-2021-36260 

 • CVE-2021-46422 

• CVE-2022-22965 

 • CVE-2022-25075 

• CVE-2022-26186 

• CVE-2022-26210 

 • CVE-2022-30525 

 • CVE-2022-34538 

 • CVE-2022-37061

Mitigations

• Search for existing signs of the indicated IOCs in your environment. 

• Block IP-based IOCs at the organization’s security devices. 

• Implement network segmentation such that all machines on your network are not accessible from every other machine. 

• If remote access is required, use a VPN with vendor best practices, multi-factor authentication, password audits, precise access control, and actively monitoring remote accesses. 

• Users logged into remote access services should have limited privileges for the rest of the corporate network. 

• Administrators should adopt multi-factor authentication and use a separate administrative account from their normal operational account. 

• Conduct cybersecurity awareness training for End- users. 

• Ensure anti-virus software and associated files are up to date. 

• Implement application whitelisting, which only allows systems to execute programs known and permitted by the organization’s security policy. 

 • Backup your data using different backup destinations, including Tape drives. 

• Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs for any unusual activity. 

• Install updates/patches operating systems, software, and firmware as soon as updates/patches are released.

References