Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Ebury

Ebury

Ebury is an OpenSSH backdoor and credential stealer targeting Linux servers and container hosts developed byWindigo.Ebury is primarily installed through modifying shared libraries (.so files) executed by the legitimate OpenSSH program. First seen in 2009,Ebury has been used to maintain a botnet of servers, deploy additional malware, and steal cryptocurrency wallets, credentials, and credit card details.[1][2][3][4]

ID: S0377
Type: MALWARE
Platforms: Linux
Contributors: Marc-Etienne M.Léveillé, ESET
Version: 2.0
Created: 19 April 2019
Last Modified: 20 September 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.004Application Layer Protocol:DNS

Ebury has used DNS requests over UDP port 53 for C2.[1]

EnterpriseT1020Automated Exfiltration

If credentials are not collected for two weeks,Ebury encrypts the credentials using a public key and sends them via UDP to an IP address located in the DNS TXT record.[5][4]

EnterpriseT1059.004Command and Scripting Interpreter:Unix Shell

Ebury can use the commandsXcsh orXcls to open a shell withEbury level permissions andXxsh to open a shell with root level.[4]

.006Command and Scripting Interpreter:Python

Ebury has used Python to implement its DGA.[3]

EnterpriseT1554Compromise Host Software Binary

Ebury modifies thekeyutils library to add malicious behavior to the OpenSSH client and the curl library.[1][4]

EnterpriseT1132.001Data Encoding:Standard Encoding

Ebury has encoded C2 traffic in hexadecimal format.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Ebury has verified C2 domain ownership by decrypting the TXT record using an embedded RSA public key.[3]

EnterpriseT1568.002Dynamic Resolution:Domain Generation Algorithms

Ebury has used a DGA to generate a domain name for C2.[1][3]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

Ebury has encrypted C2 traffic using the client IP address, then encoded it as a hexadecimal string.[1]

EnterpriseT1041Exfiltration Over C2 Channel

Ebury exfiltrates a list of outbound and inbound SSH sessions using OpenSSH'sknown_host files andwtmp records.Ebury can exfiltrate SSH credentials through custom DNS queries or use the commandXcat to send the process's ssh session's credentials to the C2 server.[5][4]

EnterpriseT1008Fallback Channels

Ebury has implemented a fallback mechanism to begin using a DGA when the attacker hasn't connected to the infected system for three days.[3]

EnterpriseT1574.006Hijack Execution Flow:Dynamic Linker Hijacking

WhenEbury is running as an OpenSSH server, it uses LD_PRELOAD to inject its malicious shared module in to programs launched by SSH sessions.Ebury hooks the following functions fromlibc to inject into subprocesses;system,popen,execve,execvpe,execv,execvp, andexecl.[3][4]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

Ebury can disable SELinux Role-Based Access Control and deactivate PAM modules.[3]

.006Impair Defenses:Indicator Blocking

Ebury hooks system functions to prevent the user from seeing malicious files (readdir,realpath,readlink,stat,open, and variants), hide process activity (ps andreaddir64), and socket activity (open andfopen).[1][4]

.012Impair Defenses:Disable or Modify Linux Audit System

Ebury disables OpenSSH, system (systemd), and audit logs (/sbin/auditd) when the backdoor is active.[4]

EnterpriseT1556Modify Authentication Process

Ebury can intercept private keys using a trojanizedssh-add function.[1]

.003Pluggable Authentication Modules

Ebury can deactivate PAM modules to tamper with the sshd configuration.[3]

EnterpriseT1027Obfuscated Files or Information

Ebury has obfuscated its strings with a simple XOR encryption with a static key.[1]

EnterpriseT1014Rootkit

Ebury acts as a user land rootkit using the SSH service.[3][4]

EnterpriseT1129Shared Modules

Ebury is executed through hooking the keyutils.so file used by legitimate versions ofOpenSSH andlibcurl.[4]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

Ebury has installed a self-signed RPM package mimicking the original system package on RPM based systems.[1]

EnterpriseT1552.004Unsecured Credentials:Private Keys

Ebury has intercepted unencrypted private keys as well as private key pass-phrases.[1]

Groups That Use This Software

IDNameReferences
G0124Windigo

[3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp