Ziggystartux

Malware updated a month ago (2024-11-29T14:01:43.835Z)
Download STIX
Preview STIX
ZiggyStarTux is a malicious software (malware) that has been identified as part of the arsenal of TeamTNT, a cybercriminal group. The malware, an open-source IRC bot based on the Kaiten malware, was first detailed by Lacework earlier this year. It operates as a backdoor, running a secondary payload embedded in the shell script vars.sh, which is a slightly modified version of ZiggyStarTux itself. Once deployed, it sets up persistence mechanisms on compromised systems, including registration as a systemd service. If the necessary file does not exist, the script downloads and executes the malicious binary from its file server, saving it to the directory /usr/sbin. The execution of the ZiggyStarTux binary involves decryption by a hardcoded Advanced Encryption Standard (AES) key and subsequent execution in memory. This process is designed to avoid detection by automated static analysis tools, with the ELF (Executable and Linkable Format) of ZiggyStarTux being encrypted and packed within another binary, named 'ziggy'. Moreover, it establishes communication with a remote command and control (C2) server through an IRC bot, enabling it to receive instructions and carry out tasks. Notably, ZiggyStarTux has been associated with distributed denial-of-service (DDoS) attacks and can execute bash commands issued from the C2 server. The bots connect to the IRC server and join a hidden password-protected channel named ##..## to receive commands. Communication between the ZiggyStarTux bots and the C2 happens via an IRC server hosted on various domains and IPs located in different geographical regions. One such domain, madagent[.]tm, registered in 2015, shares numerous servers over a four-year period with madagent[.]cc, one of the known C2 domains of ZiggyStarTux.
Description last updated: 2024-06-06T09:16:29.258Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Kaiten is a possible alias for Ziggystartux. Kaiten, also known as Tsunami, is a malware variant that operates as a Distributed Denial of Service (DDoS) bot and an IRC bot. It targets vulnerable Internet of Things (IoT) devices and poorly protected Linux SSH servers, often being distributed alongside other DDoS bots like Mirai and Gafgyt. The
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Bot
Ddos
Malware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Ziggystartux Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more