Analysis of the Rekoobe Backdoor Being Used In Attacks Against Linux Systems in Korea – ASEC BLOG

Rekoobe is a Linux backdoor used by the APT31 group that communicates with a C2 server to download, upload, and execute commands, including a reverse shell, with multiple variants observed in Korea. It uses encryption to protect C2 traffic (AES-128 via an HMAC-SHA1 key) and disguises its presence by altering its process name, based on the Tiny SHell codebase.

Keypoints

  • Rekoobe targets Linux servers and is based on Tiny SHell, supporting x86, x64, and SPARC and offering download, upload, and command execution capabilities.
  • The malware is associated with the Chinese threat group APT31 and has been observed targeting Korean organizations.

MITRE Techniques

  • [T1036] Masquerading – Disguises itself by changing its process name to β€œ/bin/bash,” which matches the name of a normal process. (β€˜disguises itself by changing its process name to β€œ/bin/bash”, which matches the name of a normal process.’)
  • [T1573] Encrypted Channel – C2 communications are encrypted using AES-128 keys derived from HMAC-SHA1. (β€˜Both Tiny SHell and Rekoobe utilize the HMAC SHA1 algorithm to generate an AES-128 key. This key is then used to encrypt the communication data with the C&C server.’)
  • [T1027] Obfuscated/Compressed Files and Information – Uses a hard-coded password and encryption for data handling in C2 communications. (β€˜aside from the two 0x14-byte IVs that are transmitted during the initialization process, a hard-coded password string, β€œ0p;/9ol.”, is also used.’)
  • [T1059.004] Unix Shell – Executes commands via a reverse shell, redirecting stdin/stdout to the C2 socket and running /bin/sh. (β€˜The reverse shell command also has a simple format of redirecting the standard input and output to the socket connected to the C&C server and executing /bin/sh.’)
  • [T1105] Ingress Tool Transfer – Supports uploading and downloading files via C2 commands; 1-byte commands select actions like file upload or download. (β€˜three commands: file upload, file download, or reverse shell.’)

Indicators of Compromise

  • [MD5] – 7851833a0cc3482993aac2692ff41635, 03a87253a8fac6d91d19ea3b47e2ca6c
  • [IP] – 139.162.116.218:18120 – C2 IP used by a sample
  • [IP] – 172.105.200.233:3661 – C2 IP used by another sample
  • [Domain] – resolv.ctmailer.net:80 – C2 URL
  • [Domain] – www.jxedunavi.com:443 – C2 URL

Read more: https://asec.ahnlab.com/en/55229/