Rekoobe is a Linux backdoor used by the APT31 group that communicates with a C2 server to download, upload, and execute commands, including a reverse shell, with multiple variants observed in Korea. It uses encryption to protect C2 traffic (AES-128 via an HMAC-SHA1 key) and disguises its presence by altering its process name, based on the Tiny SHell codebase.
Keypoints
- Rekoobe targets Linux servers and is based on Tiny SHell, supporting x86, x64, and SPARC and offering download, upload, and command execution capabilities.
- The malware is associated with the Chinese threat group APT31 and has been observed targeting Korean organizations.
-
-
MITRE Techniques
- [T1036] Masquerading β Disguises itself by changing its process name to β/bin/bash,β which matches the name of a normal process. (βdisguises itself by changing its process name to β/bin/bashβ, which matches the name of a normal process.β)
- [T1573] Encrypted Channel β C2 communications are encrypted using AES-128 keys derived from HMAC-SHA1. (βBoth Tiny SHell and Rekoobe utilize the HMAC SHA1 algorithm to generate an AES-128 key. This key is then used to encrypt the communication data with the C&C server.β)
- [T1027] Obfuscated/Compressed Files and Information β Uses a hard-coded password and encryption for data handling in C2 communications. (βaside from the two 0x14-byte IVs that are transmitted during the initialization process, a hard-coded password string, β0p;/9ol.β, is also used.β)
- [T1059.004] Unix Shell β Executes commands via a reverse shell, redirecting stdin/stdout to the C2 socket and running /bin/sh. (βThe reverse shell command also has a simple format of redirecting the standard input and output to the socket connected to the C&C server and executing /bin/sh.β)
- [T1105] Ingress Tool Transfer β Supports uploading and downloading files via C2 commands; 1-byte commands select actions like file upload or download. (βthree commands: file upload, file download, or reverse shell.β)
Indicators of Compromise
- [MD5] β 7851833a0cc3482993aac2692ff41635, 03a87253a8fac6d91d19ea3b47e2ca6c
- [IP] β 139.162.116.218:18120 β C2 IP used by a sample
- [IP] β 172.105.200.233:3661 β C2 IP used by another sample
- [Domain] β resolv.ctmailer.net:80 β C2 URL
- [Domain] β www.jxedunavi.com:443 β C2 URL
Read more: https://asec.ahnlab.com/en/55229/