{ "Event": { "analysis": "1", "date": "2020-03-12", "extends_uuid": "", "info": "Rhombus - Linux DDoS botnet aims VPS & IoT, w/persistence & dropper", "publish_timestamp": "1584048355", "published": true, "threat_level_id": "3", "timestamp": "1584048290", "uuid": "5e6aa53c-bcf8-4279-9c48-40d0950d210f", "Orgc": { "name": "MalwareMustDie", "uuid": "569e04b2-efd0-45bd-b83a-4f7b950d210f" }, "Tag": [ { "colour": "#ffffff", "local": "0", "name": "tlp:white", "relationship_type": "" }, { "colour": "#22681c", "local": "0", "name": "malware_classification:malware-category=\"Botnet\"", "relationship_type": "" }, { "colour": "#32003e", "local": "0", "name": "ms-caro-malware:malware-type=\"DDoS\"", "relationship_type": "" }, { "colour": "#5ed600", "local": "0", "name": "ddos:type=\"flooding-attack\"", "relationship_type": "" }, { "colour": "#001a42", "local": "0", "name": "ms-caro-malware-full:malware-platform=\"Linux\"", "relationship_type": "" } ], "Attribute": [ { "category": "Payload delivery", "comment": "Malware payloads and installers(dropper)", "deleted": false, "disable_correlation": false, "timestamp": "1584047562", "to_ids": false, "type": "md5", "uuid": "5e6aa5ca-9d98-4a8b-8abd-c5a7950d210f", "value": "5fd910e87382d838d9ff17e4ad5843fb" }, { "category": "Payload delivery", "comment": "Malware payloads and installers(dropper)", "deleted": false, "disable_correlation": false, "timestamp": "1584047562", "to_ids": false, "type": "md5", "uuid": "5e6aa5ca-1470-4d9e-88f7-c5a7950d210f", "value": "d93c7daebe7adc95e575c9934248d00f" }, { "category": "Payload delivery", "comment": "Malware payloads and installers(dropper)", "deleted": false, "disable_correlation": false, "timestamp": "1584047562", "to_ids": false, "type": "md5", "uuid": "5e6aa5ca-12a4-4a7a-84ac-c5a7950d210f", "value": "239aecbf01af2ff17b6cfbe606db5808" }, { "category": "Payload delivery", "comment": "Malware payloads and installers(dropper)", "deleted": false, "disable_correlation": false, "timestamp": "1584047562", "to_ids": false, "type": "md5", "uuid": "5e6aa5ca-1e10-41b9-91f2-c5a7950d210f", "value": "ba42665872ea41e3d2edd8978bc38c24" }, { "category": "Payload delivery", "comment": "Malware payloads and installers(dropper)", "deleted": false, "disable_correlation": false, "timestamp": "1584047562", "to_ids": false, "type": "md5", "uuid": "5e6aa5ca-41cc-4e2c-8dd6-c5a7950d210f", "value": "e7b10bb7b81346d31f126e202d62a157" }, { "category": "Network activity", "comment": "C2 IP address", "deleted": false, "disable_correlation": false, "timestamp": "1584047631", "to_ids": false, "type": "ip-dst", "uuid": "5e6aa60f-fcf0-4630-9bd1-4930950d210f", "value": "209.126.69.167" }, { "category": "Network activity", "comment": "C2 IP address", "deleted": false, "disable_correlation": false, "timestamp": "1584047635", "to_ids": false, "type": "ip-dst", "uuid": "5e6aa613-ee50-4601-809d-4f37950d210f", "value": "45.135.134.132" }, { "category": "Network activity", "comment": "C2 IP address", "deleted": false, "disable_correlation": false, "timestamp": "1584047635", "to_ids": false, "type": "ip-dst", "uuid": "5e6aa613-8d04-427a-af67-49e5950d210f", "value": "167.172.128.4" }, { "category": "Network activity", "comment": "C2 IP address", "deleted": false, "disable_correlation": false, "timestamp": "1584047635", "to_ids": false, "type": "ip-dst", "uuid": "5e6aa613-54dc-4a5e-b9f0-435e950d210f", "value": "205.185.122.243" }, { "category": "Payload delivery", "comment": "Persistence setup filename", "deleted": false, "disable_correlation": false, "timestamp": "1584047745", "to_ids": false, "type": "filename", "uuid": "5e6aa681-e5f8-4a06-bb94-46b1950d210f", "value": "/etc/rc.d/rc.local" }, { "category": "Payload delivery", "comment": "Persistence setup filename", "deleted": false, "disable_correlation": false, "timestamp": "1584047745", "to_ids": false, "type": "filename", "uuid": "5e6aa681-6304-499c-a869-4b57950d210f", "value": "/etc/rc.local" }, { "category": "Payload delivery", "comment": "Persistence setup filename", "deleted": false, "disable_correlation": false, "timestamp": "1584047745", "to_ids": false, "type": "filename", "uuid": "5e6aa681-94d4-4fd3-b587-424b950d210f", "value": "/etc/cron.hourly/0" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1584047865", "to_ids": false, "type": "filename", "uuid": "5e6aa6f9-aa4c-4ef7-a13f-4510950d210f", "value": "RHOMBUS.arm5" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1584047865", "to_ids": false, "type": "filename", "uuid": "5e6aa6f9-fd94-4d86-8b46-46a4950d210f", "value": "RHOMBUS.mpsl" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1584047865", "to_ids": false, "type": "filename", "uuid": "5e6aa6f9-0084-4eeb-977b-4cdf950d210f", "value": "RHOMBUS.sh4" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1584047865", "to_ids": false, "type": "filename", "uuid": "5e6aa6f9-43f4-4e3d-9902-4780950d210f", "value": "RHOMBUS.x86" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1584047865", "to_ids": false, "type": "filename", "uuid": "5e6aa6f9-8078-42d1-ac45-40c3950d210f", "value": "RHOMBUS.x86_64" }, { "category": "Internal reference", "comment": "Threat report", "deleted": false, "disable_correlation": false, "timestamp": "1584047924", "to_ids": false, "type": "link", "uuid": "5e6aa734-6504-4610-abbb-4a01950d210f", "value": "https://reddit.com/r/LinuxMalware/comments/fh3zar/memo_rhombus_an_elf_bot_installerdropper/" } ] } }