Malicious Sustes has been updated and is now spreading through Exim's vulnerability (CVE-2019-10149)



The malware Sustes has been updated and is now spreading through the vulnerability in Exim (CVE-2019-10149).

A new wave of crypto miner Sustes now uses the June vulnerability in Exim mail server for infections. Starting on August 11, our PT Network Attack Discovery network sensors detect attempts to operate mail servers in incoming network traffic.

Scanning takes place from the address 154.16.67 [.] 133, and the command in the RCPT TO field loads the malicious bash script at the address hxxp: //154.16.67 [.] 136 / main1. A chain of scripts results in installing an XMR miner on the host and adding it to crontab. The script adds its public SSH key to the authorized_keys list of the current user, which will allow attackers to gain passwordless SSH access to the machine in the future.

Additionally, Sustes is trying to propagate to other hosts from the known_hosts list over SSH; it is expected that they are automatically connected to them using the public key. The infection process is repeated again on available SSH hosts.



There is another way of distribution. Sustes executes a chain of Python scripts, the last of which - hxxp: //154.16.67 [.] 135 / src / sc - contains a random Redis server scanner that also adds itself to crontab for autorun and its key to the list of trusted SSH- keys on vulnerable Redis servers:

x = s2.connect_ex((self.host, 6379)) … stt2=chkdir(s2, '/etc/cron.d') rs=rd(s2, 'config set dbfilename crontab\r\n') rs=rd(s2, 'config set dbfilename authorized_keys\r\n') stt3=chkdir(s2, '/root/.ssh') 

Getting rid of the malware Sustes is quite simple: delete the malicious files and scripts with the names from the list below, and also clean the crontab and known_hosts files from the malicious entries. Sustes exploits other vulnerabilities to infect, for example, a vulnerability in the Hadoop YARN ResourceManager, or uses account brute force.

IoCs:

Filenames:


/etc/cron.hourly/oanacroner1
/etc/cron.hourly/cronlog
/etc/cron.daily/cronlog
/etc/cron.monthly/cronlog
sustse
.ntp
kthrotlds
npt
wc.conf

Urls:


hxxp: //154.16.67.135/src/ldm
hxxp: //154.16.67.135/src/sc
hxxp: //107.174.47.156/mr.sh
hxxp: //107.174.47.156/2mr.sh
hxxp: //107.174.47.156/wc.conf
hxxp: //107.174.47.156/11
hxxp: //154.16.67.136/mr.sh
hxxp: //154.16.67.136/wc.conf

Custom Monero Pools


185.161.70.34{333
154.16.67.133:80
205.185.122.99haps333

Wallet


4AB31XZu3bKeUWtwGQ43ZadTKCfCzq3wra6yNbKdsucpRfgofJP3YwqDiTutrufk8D17D7xw1zPGyMspv8Lqwwg36V5chYg

SSH Public key


AAAAB3NzaC1yc2EAAAADAQABAAAsdBAQC1Sdr0tIILsd8yPhKTLzVMnRKj1zzGqtR4tKpM2bfBEx AHyvBL8jDZDJ6fuVwEB aZ8bl / pA5qhFWRRWhONLnLN9RWFx / 880msXITwOXjCT3Qa6VpAFPPMazJpbppIg LTkbOEjdDHvdZ8RhEt7tTXc2DoTDcs73EeepZbJmDFP8TCY7hwgLi0XcG8YHkDFoKFUhvSHPkzAsQd9hyOWaI1taLX2VZHAk8rOaYqaRG3URWH3hZvk8Hcgggm2q / IQQa9VLlX4cSM4SifM / ZNbLYAJhH1x3ZgscliZVmjB55wZWRL5oOZztOKJT2oczUuhDHM1qoUJjnxopqtZ5DrA76WH

MD5


95e2f6dc10f2bc9eecb5e29e70e29a93
235ff76c1cbe4c864809f9db9a9c0c06
e3363762b3ce5a94105cea3df4291ed4
e4acd85686ccebc595af8c3457070993
885beef745b1ba1eba962c8b1556620d
83d502512326554037516626dd8ef972

Script Files:
Main1 pastebin.com/a2rgcgt3
Main1 py snippet pastebin.com/Yw2w6J9E
src / sc pastebin.com/9UPRKYqy
src / ldm pastebin.com/TkjnzPnW

Source: https://habr.com/ru/post/466877/


All Articles