A new cross-platform botnet family named hpingbot, developed in Go language, is rapidly spreading and evolving with capabilities to launch DDoS attacks using the hping3 tool and distribute arbitrary payloads via Pastebin. The botnet shows strong innovation with independent propagation modules, multiple persistence mechanisms, and frequent updates, posing a significant threat as a potential long-term malware operation with risks of distributing advanced threats like ransomware or APT components. #hpingbot #hping3 #Pastebin
Keypoints
- Hpingbot is a newly discovered botnet family developed in Go, supporting Windows and Linux/IoT with multi-architecture versions (amd64, mips, arm, 80386).
- The botnet leverages the online text-sharing platform Pastebin for flexible payload distribution and uses the network testing tool hping3 to launch various types of DDoS attacks.
- Hpingbotâs Windows version cannot directly use hping3 but remains highly active, suggesting a focus on downloading and executing arbitrary payloads beyond DDoS.
- It employs independent SSH propagation modules, multiple persistence methods (Systemd, SysVinit, Cron), and trace cleaning to avoid detection.
- The attacker frequently updates C&C servers and Trojan versions, indicating a professional development effort and potential for long-term operation.
- Hpingbot has been used to perform DDoS attacks primarily targeting Germany, the US, and Turkey, with a focus on stealth and reduced operational cost.
- New DDoS components distributed through hpingbot show ongoing attacker testing and potential replacement or supplementation of original botnet capabilities.
MITRE Techniques
- [T1059.004] Command and Scripting Interpreter: Unix Shell â Used to execute attack tools and system architecture detection via Shell scripts (âExecute attack tool deployment and system architecture detection through Shell scriptsâ).
- [T1569.002] System Services: Service Execution â Utilized in managing system services for persistence (âCombine system services (Systemd/SysVinit) with scheduled tasks (Cron) to achieve a persistence mechanismâ).
- [T1543.002] Create or Modify System Process: Systemd Service â Used to create service unit files for botnet persistence (âCreate a service unit file, set the boot self-start and start the serviceâ).
- [T1037.004] Boot or Logon Initialization Scripts: RC Scripts â Implemented for persistence (âCreate an init script and enable autostart with update-rc.d or chkconfigâ).
- [T1053.003] Scheduled Task/Job: Cron â Cron jobs set to run on restart to maintain persistence (âSet to run on restart via the @reboot ruleâ).
- [T1070.004] Indicator Removal: File Deletion â File self-deletion after execution to avoid detection (âPerform file self-deletion after execution to avoid detectionâ).
- [T1070.003] Indicator Removal: Clear Command History â Clearing command history to evade tracking (âClear command historyâ).
- [T1102.002] Web Service: Pastebin â Pastebin is used to host malicious payloads for flexible distribution (âUse Pastebin platform to host malicious payloadsâ).
- [T1095] Non-Application Layer Protocol â hping3 used to launch DDoS attacks at the network layer (âDeploy hping3 to launch DDoS attacksâ).
- [T1008] Fallback Channels â Use of multiple C&C servers and update commands for resilience (âFrequent replacement of C&C serversâ).
- [T1498] Network Denial of Service â Launching various DDoS attack types using hping3 with custom parameters (âDDoS attack instructions executed by calling hping3 with specified parametersâ).
- [T1082] System Information Discovery â Detecting system architecture for adaptive payload deployment (âArchitecture identification to generate corresponding file namesâ).
- [T1588.001] Acquire Tool: Software â Installation of hping3 via package managers for attack purposes (âHpingbot downloads and installs hping3 by executing the command apt -y install hping3â).
- [T1588.006] Acquire Infrastructure: Web Services â Use of Pastebin and controlled nodes for infrastructure supporting payload delivery (âUses Pastebin and controlled nodes to distribute other componentsâ).
Indicators of Compromise
- [IP Addresses] Attack targets and C&C infrastructure â 45.139.113.61, 193.32.162.210
- [Domains/URLs] Payload hosting and distribution â http://128.0.118.18, http://93.123.118.21, http://94.156.181.41
- [File Hashes] Sample malware identification â F33E6976E3692CB3E56A4CC9257F5AAE
- [IP Addresses] Victim of multiple DDoS attacks used for testing â 79.*.*.212 (partial)