New Stealthy Linux Malware Merges Mirai DDoS Botnet with Cryptocurrency Miner

Published:

spot_img

Emerging Threat: New Linux Malware Blends DDoS and Cryptomining Functions

Recent findings from Cyble researchers have uncovered a novel strain of Linux malware that skillfully integrates features from the notorious Mirai botnet with sophisticated, fileless cryptomining capabilities. This combination allows cybercriminals to both disrupt networks and generate illicit financial gains through a single threat vector.

### A Sophisticated Operation

In a blog post released today, Cyble’s threat intelligence team described this campaign as a “sophisticated and financially motivated operation,” which merges botnet propagation with covert cryptomining techniques. The skillful application of stealthy techniques enables this new variant of Mirai to operate under the radar, making it particularly concerning for organizations.

### Evading Detection

The malware employs multiple advanced strategies to remain undetected, utilizing methods such as raw-socket scanning, masqueraded processes, internal localhost inter-process communication (IPC), dynamic DNS resolution, and a fileless miner configuration. These tactics are designed to ensure long-term persistence on infected machines, according to Cyble researchers.

### Dual Functionality: DDoS and Cryptomining

This malware represents a growing trend among cybercriminals who are adopting hybrid monetization strategies. By leveraging infected Linux systems not just for DDoS attacks but also for illicit cryptocurrency mining, attackers are maximizing their returns on investment. Organizations managing Linux servers, cloud workloads, or exposed IoT devices should act promptly to enhance their defenses and maintain ongoing monitoring to mitigate risks.

### Infection Process

The malware initiates a multi-stage infection process that begins with a downloader responsible for distributing architecture-specific V3G4/Mirai binaries across various systems, including x86_64, ARM, and MIPS architectures. The second stage, designated as Mddos.x86_64, features a statically linked and UPX-packed Executable and Linkable Format (ELF) file that has stripped symbols. This makes it particularly challenging to inspect statically.

Once executed, the malware collects system information and then engages stealth mode, disguising its process as a system daemon (systemd-logind). It detaches from the terminal and launches multiple worker threads. These threads serve various functions, including coordinating attack operations, enabling command and control (C2) communication, and managing IPC.

### Precision Scanning Techniques

A defining characteristic of this Mirai variant lies in its use of raw TCP sockets. This allows for the precise crafting of SYN packets, facilitating high-velocity SSH scanning campaigns. Concurrently, worker threads also resolve the C2 domain (baojunwakuang[.]asia) by making repeated queries to Google Public DNS (8.8.8.8), ensuring stable communication channels for command execution.

This multi-threaded DNS resolution method is characteristic of Mirai-style bots, allowing continuous connectivity while executing various attacks in parallel.

### Covert Cryptomining

The malware’s third stage involves deploying a hidden Monero cryptominer. It accomplishes this by downloading a UPX-packed XMRig binary from the IP address 159.75.47[.]123, cleverly storing it in the directory /tmp/.dbus-daemon to mimic a legitimate system process.

Instead of using a traditional local configuration file, the miner acquires its settings dynamically from the C2 server. This real-time configuration enables updates to wallet addresses, mining pools, and algorithms without leaving discernible traces on disk, complicating forensic investigations.

### Dynamic Configuration

In contrast to typical miner setups that embed static configurations, this malware requests runtime data from the C2 server. By doing so, attackers avoid revealing wallet addresses and pool endpoints during static analysis, while also dynamically adapting mining parameters. When the miner executes, it connects to the C2 server to obtain a JSON response containing crucial information like the pool URL, wallet address, mining algorithm, and thread count.

For further insights, the full Cyble blog post offers detailed recommendations for cybersecurity defenders, along with related MITRE ATT&CK techniques and indicators of compromise (IoCs) that can aid in the identification and mitigation of this emerging threat.

spot_img

Related articles

Recent articles

Google’s Dark Web Monitoring Is Ending: Next Steps for You

Google is set to discontinue its dark web monitoring service designed to warn users about the exposure of personal information, such as names, email...

Understanding the Digital Trust Crisis: Why We Question Every Click

When Convenience Turns into Caution The internet was originally founded on a principle of trust: confidence that online transactions would be secure, personal identities would...

84 Hours of Internet Blackout in Iran Amid Growing Unrest

Iran's Internet Blackout: A Deepening Crisis Amid Unrest Four Days Without Connectivity Iran has plunged into a state of digital isolation as an internet blackout enters...

NSA Appoints Timothy Kosiba to Lead Cybersecurity Strategy

Appointment of Timothy Kosiba as NSA Deputy Director: A Leadership Milestone The National Security Agency (NSA) has recently announced a pivotal leadership change with the...