EHA
Home Botnet Androxgh0st Botnet Operators Exploit US University to Host C2 Logger

Androxgh0st Botnet Operators Exploit US University to Host C2 Logger

0

CloudSEK’s latest investigation has uncovered a significant escalation in the tactics of the Androxgh0st botnet, which has been active since at least March 2023.

The operators have now exploited a misconfigured subdomain belonging to the University of California, San Diego (UCSD), specifically the “USArhythms” portal, to host a command-and-control (C2) logger panel.

This subdomain, associated with the USA Basketball Men’s U19 National Team, was repurposed as a central hub for logging malicious botnet activity and orchestrating further attacks.

Androxgh0st is known for its rapid evolution, weaponizing a diverse set of initial access vectors (IAVs) targeting widely used platforms and frameworks.

Since August 2024, CloudSEK’s TRIAD team has tracked the botnet’s exploitation of over 20 vulnerabilities, including those in Apache Shiro, Spring Framework (Spring4Shell), WordPress plugins, and IoT devices such as Lantronix PremierWave.

The attackers leverage these vulnerabilities for remote code execution (RCE), command injection, and sensitive data exfiltration.

misconfigured Logger and Command Sender panels

The C2 logs analyzed by CloudSEK reveal a broad spectrum of exploitation attempts, including JNDI and OGNL injections, Unix command injections, and targeted attacks against WordPress plugins and IoT command interfaces.

Attack Techniques

The Androxgh0st operators employ sophisticated exploitation techniques. For instance, they exploit JNDI injection vulnerabilities in Apache Shiro and FasterXML jackson-databind, enabling RCE by directing vulnerable servers to connect to attacker-controlled RMI servers.

Unix command injection is also prevalent, with payloads like “;cat /etc/passwd” used to extract sensitive user information.

The botnet targets the WordPress “Popup Maker” plugin (CVE-2019-17574) to trigger information disclosure, and leverages command injection in the Lantronix WLANScanSSID function (CVE-2021-21881) to gain remote control over IoT devices.

Attacks against Apache Struts utilize complex OGNL payloads to manipulate the Java runtime environment, while Spring Framework exploitation (Spring4Shell, CVE-2022-22965) involves tampering with class loader properties to achieve RCE.

The logs also indicate the deployment of cryptomining malware, with JSON-RPC requests fetching mining tasks from cryptocurrency pools.

Webshell Arsenal

Persistence is maintained through the deployment of multiple webshell variants, including:

  • abuok.php: Utilizes hex2bin and eval obfuscation for remote code execution via POST requests.
  • myabu.php: Employs ROT13 obfuscation, enabling arbitrary code execution.
  • scwj.php: Functions as a file upload backdoor for further payload delivery.
  • baocun.php: Acts as a code dropper, writing attacker-supplied scripts to disk.

These webshells are designed to evade detection and provide attackers with ongoing access for lateral movement and additional exploitation.

The compromise of academic infrastructure for C2 hosting exposes sensitive data, facilitates further malware distribution, and enables cryptomining operations.

The misuse of trusted university domains increases the risk of brand damage and regulatory repercussions.

CloudSEK recommends immediate patching of affected systems, strict firewall controls on RMI/LDAP/JNDI traffic, regular audits for suspicious PHP files, and the deployment of web application firewalls (WAF) or runtime application self-protection (RASP) solutions.

Detection strategies should focus on identifying obfuscated webshells, suspicious POST parameters, and anomalous outbound traffic to known malicious domains.

Indicators of Compromise (IOC)

IndicatorTypeComments
cv032vemsb87jtt2p11g5h8xztka6kruj[.]oast[.]meSubdomainGeneral C2 activity
d0i0taritt4c9dh9hln06thpknw9dcqhu[.]oast[.]todaySubdomainGeneral C2 activity
ch14vjilcoecm8580ft0g6xsmrkewgwro[.]oast[.]liveSubdomainGeneral C2 activity
chcmp35oujaubpa7e86g1wz9dypg9oc67[.]oast[.]siteSubdomainGeneral C2 activity
chi2p4r4bcdfd791dh50c6dpgu4h9rdhc[.]oast[.]funSubdomainGeneral C2 activity
cj7409i4t88ukb0publgakedcbwnz7nzy[.]oast[.]liveSubdomainLantronix WLANScanSSID Command Injection
cv032vemsb87jtt2p11gwf68p1xw7rgtk[.]oast[.]meSubdomainFastjson-v1.2.47 RCE
cj7409i4t88ukb0publgjtkyt534mnrby[.]oast[.]liveSubdomainSpring4Shell exploitation
chke3769l5m6jbj8hq90fu71kckky5x63[.]oast[.]funSubdomainApache Shiro, FasterXML jackson-databind
185.172.128[.]93IP AddressCVE-2024-4577 exploitation
9e1fb14b747b5bdaf817845007a47752MD5 HashWebshell (abuok.php)
d6efe92ca18570f940a720e51af77f72MD5 HashWebshell (myabu.php)
f65749ddf93e890b48b3bde77b1302aaMD5 HashWebshell (scwj.php)
5a12416857547341493b436299e9b886MD5 HashWebshell (baocun.php)

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version