Antivirus firms Dr.Web’s researchers have identified a new variant of Mirai bot, the infamous IoT malware.
This new variant is capable of targeting Windows systems and can take on more ports than its Linux version. Dr.Web researchers have dubbed the new version as Trojan.Mirai.1.
Mirai’s Windows version is in use by cybercriminals for infecting Internet of Things (IoT) devices and conducting distributed denial of service (DDoS) attacks.
The original version of the malware was discovered in August 2016 by a researcher MalwareMustDie.
Back then, it was identified as malware designed to target IoT devices and turn them into controllable bots specifically.
Many high-profile organizations including DynDNS, security researcher Brian Krebs’ blog KrebsOnSecurity and OVH hostings were among the key targets.
The purpose of developing a Windows compatible version of the notorious malware, according to Dr.Web researchers, was to ensure that Mirai is “spread to even more devices.”
Mirai malware is capable of infecting a diverse array of devices, but its main targets happen to be internet routers and IoT devices such as CCTV systems and DVRs.
Once the malware manages to infect a device, it selects random IPs and tries to log in through the SSH or the Telnet port.
To do this, it utilizes the list of default admin credentials of the targeted device.
The new version is believed to be a Trojan developed for Microsoft Windows.
It is written in C++ language.
According to researchers, it has been designed to “scan TCP ports from the indicated range of IP addresses to execute various commands and distribute other malware.”
When it is launched, the malware creates a link with its C&C (command and control) server and downloads the “configuration file (wpd.dat), and extracts the list of IP addresses.”
Afterward, it launches the scanner and also checks for other ports.
After Trojan.Mirai.1 succeeds in compromising a new device with the malware, it runs the Linux OS and also launches various commands to create a DDoS Mirai bot, but if the device is running MS Windows OS, it just releases its copy.
Additionally, it creates DBMS user through using the login ID “Mssqla and password Bus3456#qwein.”
These credentials provide it the sysadmin rights.
It can now perform a variety of tasks using the credentials and the SQL server event service.
It cannot, however, execute instructions on any connection through the RDP protocol.
Apart from that, it downloads a binary file on the infected device when attempting to connect to the Linux device via Telnet protocol.
Lastly, it downloads and launches “Linux.Mirai.”