Shellbot

Malware updated 23 days ago (2024-11-29T13:32:06.742Z)
Download STIX
Preview STIX
ShellBot is a malicious software (malware) variant that has been actively targeting poorly managed Linux SSH servers. As reported by Hacker News and HackRead in March 2023, this Perl-based DDoS bot deploys different variants to exploit these servers. ShellBot, along with another DDoS malware called Tsunami, are distributed by the same threat actor. The malware is highly customizable, with various versions offering different capabilities and attack methods. Notably, ShellBot uses the IRC protocol for Command & Control (C&C) communication, enabling it to receive commands like executing remote tasks or launching DDoS attacks without needing a custom C&C infrastructure. After gaining access to a system, ShellBot is installed and often achieves persistence by modifying startup scripts or cron jobs. Once installed, it connects to a C&C server via the IRC protocol, enabling attackers to issue commands, steal data, and launch DDoS attacks. ASEC reported on March 13, 2023, that ShellBot was actively targeting Linux SSH servers. By September 12, 2024, samples of ShellBot were found alongside a malware called SUPERSHELL. The attribution of these attacks is challenging, but there is speculation of involvement from Romanian threat actors, possibly linked to the 'Outlaw APT' group. ShellBot exploits vulnerabilities such as the Cacti bug to infect systems. Since January 2023, several malware botnet attacks have sought to spread Moobot and ShellBot through the exploitation of a critical Cacti command injection bug (CVE-2022-46169) and a critical Realtek Jungle SDK remote code execution flaw (CVE-2021-35394). These threat actors are also involved in the development and sale of cyber weapons, an activity that is not very common. Therefore, ensuring adequate vulnerability management and maintaining up-to-date security measures are crucial in preventing ShellBot infections.
Description last updated: 2024-09-13T06:16:12.591Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Perlbot is a possible alias for Shellbot. PerlBot, also known as ShellBot, is a harmful malware developed using the Perl programming language. This Distributed Denial of Service (DDoS) bot is designed to exploit poorly managed Linux SSH servers, primarily through dictionary attacks on weak SSH credentials. It uses the IRC protocol for Comma
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Linux
Ddos
Vulnerability
SSH
Fortiguard
Payload
Backdoor
Botnet
Xmrig
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Modded Perlbot V2 Malware is associated with Shellbot. Modded Perlbot v2 is a new strain of the ShellBot DDoS bot malware that has been identified as part of an attack campaign targeting mismanaged Linux SSH servers. This campaign, which began on March 22, 2023, involves the distribution of three distinct strains of the ShellBot malware: PowerBots GohacUnspecified
3
The Moobot Malware is associated with Shellbot. Moobot is a malicious software (malware) that is based on the Mirai platform. This malware was designed to infiltrate devices and systems, often through suspicious downloads, emails, or websites without user knowledge. Once inside a system, Moobot facilitated targeted attacks against various entitieis related to
3
The Ddos Pbot v2.0 Malware is associated with Shellbot. On March 22, 2023, mismanaged Linux SSH servers were targeted by a novel attack campaign involving the distribution of three new strains of the ShellBot DDoS bot malware, including PowerBots GohacK, LiGhT's Modded perlbot v2, and DDoS PBot v2.0, as reported by The Hacker News. These attacks were espUnspecified
2
The Xmrig Coinminer Malware is associated with Shellbot. XMRig CoinMiner is a type of malware that has been identified as part of a wave of attacks on poorly managed Linux SSH servers. These attacks, often conducted by threat actors installing multiple malware families, have been observed to include other harmful software such as ShellBot, Tsunami, and ChUnspecified
2
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The CVE-2022-46169 Vulnerability is associated with Shellbot. CVE-2022-46169 is a critical pre-authentication command injection vulnerability discovered in the Cacti network operations framework. This flaw, which existed in all versions of Cacti up to 1.2.22, could be exploited by threat actors to deliver malware, thereby compromising the security of systems uUnspecified
3
The CVE-2021-35394 Vulnerability is associated with Shellbot. The CVE-2021-35394 vulnerability, a flaw in the software design or implementation of Realtek Jungle SDK, has seen significant exploitation by threat actors. From August to October 2022, the number of attacks attempting to exploit this remote code execution vulnerability accounted for more than 40% oUnspecified
2
Source Document References
Information about the Shellbot Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Contagio
3 months ago
InfoSecurity-magazine
8 months ago
CERT-EU
2 years ago
CERT-EU
10 months ago
Securityaffairs
10 months ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
2 years ago