Paul Scott

Paul Scott
on February 3, 2019

Threat Report Sunday February 3rd 2019

Threat Report

Tragedy strikes! Cayosin Botnet combines Qbot and Mirai to cause Erradic behavior

Recently, we came across an emerging botnet as-a-service, the Cayosin Botnet. We first observed Cayosin on January 6, 2019, and activity has been ramping up. We have data on 55 scanning IPs, with indicators consistent to attacks built into Cayosin. Based on data from the threat actors, the bot count is over 1,100 as of February 2nd.

cayosin
Perchybana

Cayosin appears to be created by Erradic, of RyM Tradgedy. Accounts (spots) for Cayosin Botnet are being sold via Instagram by @unholdable and @pumperdumper. A YouTube demo of Cayosin was posted two days after the scanning began. If you watch their Instagram stories, you can get frequent updates on Cayosin’s growth.

Instagram Conversation

Cayosin largely recycles exploits utilized by other botnets, like Mirai, though the injections reference a second stage binary hosted at 185.244.25[.]241 – an IP address not observed among the 55 IPs scanning with the first stage exploit.

http://185.244.25[.]241/bins/cock.mpsl

http://185.244.25[.]241/bins/cock.x86

Based on reverse engineering of the binaries that unixfreaxjp posted to Imgur, we understand that the codebase of Cayosin shares characteristics with Torlus/Qbot/Lizkebab. 185.244.25[.]241 was scanning, but primarily for open telnet services. 185.244.25[.]241 is a Netherlands VPS that is serving two binaries we recovered. Once the second stage infection is executed on a vulnerable host, the host will reach out to hostnamepxssy[.]club.

Perchybana Activity

On January 26, 2019, we saw a change in behavior and some of the IPs were scanning with a new user-agent, “Cock/2.0” instead of “Cayosin/2.0”. This change in behavior may have something to do with a customer service dispute that led to the source code of Cayosin being posted on pastebin. We were unable to find that pastebin post, but it could have prompted a new build of the botnet.

This is not the team’s first tool. They have created a few along the way like Summit, Tragic, and about a dozen others. You can learn more about these tools by following the various Instagram accounts of the crew. They seem interested in building tools to DDoS and boast about taking down services with OVH, Choopa, NFO – and if the hype is real, maybe even Rocket League servers.

User-Agents

  - Cayosin/2.0
  - Cock/2.0

First stage IPs

  - 101.255.95[.]34

  - 103.102.133[.]11

  - 103.113.156[.]46

  - 103.24.104[.]98

  - 103.62.152[.]58

  - 104.185.20[.]41

  - 113.11.154[.]162

  - 114.108.229[.]59

  - 115.127.103[.]132

  - 115.127.103[.]139

  - 115.127.5[.]244

  - 117.102.69[.]124

  - 117.102.69[.]125

  - 117.102.69[.]126

  - 118.97.55[.]101

  - 119.40.84[.]155

  - 119.73.133[.]87

  - 120.28.151[.]44

  - 120.29.125[.]194

  - 121.235.3[.]65

  - 121.7.226[.]57

  - 122.117.162[.]61

  - 122.144.11[.]195

  - 122.96.208[.]32

  - 125.165.180[.]211

  - 144.202.60[.]94

  - 152.169.218[.]80

  - 162.244.80[.]47

  - 162.244.81[.]232

  -163.172.91[.]156

  - 175.106.11[.]179

  - 176.152.38[.]195

  - 185.105.4[.]172

  - 185.105.4[.]183

  - 185.244.25[.]201

  - 190.6.141[.]59

  - 202.162.204[.]36

  - 202.86.222[.]4

  - 203.129.22[.]119

  - 203.160.63[.]125:

  - 203.177.173[.]46

  - 219.74.127[.]169

  - 223.197.212[.]15

  - 36.37.220[.]57

  - 36.66.16[.]117

  - 36.89.106[.]19

  - 45.124.15[.]48

  - 46.8.209[.]105

  - 58.212.57[.]219

  - 65.127.187[.]7

  - 67.205.154[.]69

  - 74.93.73[.]169

  - 83.208.108[.]189

  - 85.197.162[.]91

  - 95.27.246[.]66

Second stage IP

185.244.25[.]241

C2 Domain

hostnamepxssy[.]club

Binary info

cock.x86 (ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped)

md5 - 7cd9788dd9a5e97ca2e0a0480d4c377a  

sha256 - e5173e4e4a1044858a14002a45507bb75772b21ceb348488bef465c2d22b791d

cock.mpsl (ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV))

md5 - 283d4888af0d820ba1d6f72e586a8410  

sha256 - 96ecc0e9b9e6f4f0275c4041e128d5ee87b51148e0e74b0379ece5edebb22792

We'd love to hear your thoughts. Find us on Twitter, LinkedIn or write in to hello@perchsecurity.com

Next: Threat Report Wednesday January 30th 2019

Share this on:

Paul Scott

Paul Scott
on February 3, 2019


Perchy Subscribe to our blog