A couple of days ago we learned about the existence of a new threat IoT considerably more elaborated than any of the ones detected to date (http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/), said botnet has been named by Netlab 360 as IotReaper. So, from the malware laboratory of S2 Grupo we have obtained and analyzed some of the related samples.
Infrastructure
The infrastructure of the network is quite similar to that of the Mirai botnet, which is formed by four elements:
- Report Server: Responsible for collecting the information sent by the bots.
- Server Downloader: Responsible for providing malware samples via HTTP. The presence of an element allows the continuous incorporation of updates without the need to leave obsolete versions of the malware.
- Server C2: Responsible for sending denial of service orders.
- Bot: IoT device infected by the IotReaper botnet.