Andoryubot

Malware updated 5 months ago (2024-05-04T17:19:43.273Z)
Download STIX
Preview STIX
AndoryuBot is a relatively new botnet malware that first appeared in February 2023. It exploits vulnerabilities in Ruckus devices, enabling it to gain unauthorized access and compromise the target device. The malware contains DDoS attack modules for different protocols and communicates with its command-and-control server using SOCKS5 proxies. After gaining entry, AndoryuBot downloads a script for additional spread and quickly begins communicating with its C2 server via the SOCKS protocol. It uses a method called "curl" for downloading itself, although Fortinet identified an error in the code that prevents it from running on some computers. The AndoryuBot variant targets multiple architectures including arm, m68k, mips, mpsl, sh4, spc, and x86. It includes 12 methods: tcp-raw, tcp-socket, tcp-cnc, tcp-handshake, udp-plain, udp-game, udp-ovh, udp-raw, udp-vse, udp-dstat, udp-bypass, and icmp-echo. After initialization, the malware sends a GET request to extract the victim’s public IP address. The campaign distributing this current version of AndoryuBot started sometime after mid-April, as reported by Fortinet's senior antivirus analyst Cara Lin. To protect devices against the AndoryuBot botnet, it is recommended to install all available patches and replace any legacy devices that have reached their end of life (EoL). Awareness of this threat has been raised through various channels, including a YouTube video published on April 25, providing an overview of "Andoryu Net". As AndoryuBot continues to exploit the Ruckus vulnerability, users are advised to remain vigilant and ensure their systems are up-to-date with the latest security measures.
Description last updated: 2024-05-04T16:36:15.795Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Botnet
Vulnerability
Malware
Exploit
Ddos
RCE (Remote ...
exploited
Youtube
Ddos Botnet
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The CVE-2023-25717 Vulnerability is associated with Andoryubot. CVE-2023-25717 is a software vulnerability, specifically a flaw in the design or implementation of the Ruckus AP remote code execution. In April 2023, FortiGuard Labs observed a unique botnet leveraging this vulnerability, utilizing the SOCKS protocol for distribution. This incident represents a sigUnspecified
3
Source Document References
Information about the Andoryubot Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more