Home / Industry

Examining the Mirai.TBOT IoCs under the DNS Microscope

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

The Mirai botnet, first discovered way back in 2016, made headlines and gained infamy as the biggest botnet to hit networks the world over. It has resurfaced with multiple ways of infecting Internet of Things (IoT) devices and the ability to launch zero-day exploits.

XLab researchers performed a thorough analysis of what they’ve dubbed “Mirai.TBOT” and identified 112 domains and 22 IP addresses as indicators of compromise (IoCs) in the process. We expanded the published list of IoCs to determine other potential infection avenues and found:

  • One email-connected domain
  • Six IP-connected domains, all of which turned out to be malicious
  • 6,863 string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Mirai.TBOT IoC Facts

We began our investigation by taking a closer look at the 134 IoCs.

A bulk WHOIS lookup for the 112 domains identified as IoCs revealed that:

  • They were distributed among six registrars led by eNom, Inc. and Hostinger Operations UAB, which accounted for four domains each. Cloudflare, Inc. took the second spot with two domains. Epik, Inc.; NameSilo LLC; and Nominalia shared the third place with one domain each. A total of 99 domains, however, didn’t have current registrar data.
  • Thirteen domains were created in 2022 and 2023. The remaining 99 didn’t have creation dates in their current WHOIS records, though.
  • The U.S. was the top registrant country, accounting for eight domains. Four domains were registered in the U.K. while the remaining 100 didn’t have registrant country information in their current WHOIS records.

Next, we subjected the 22 IP addresses to a bulk IP geolocation lookup and found that:

  • A majority of them, 15 to be exact, were geolocated in Belgium. Two each pointed to Germany, the Netherlands, and the U.S. while the last one was geolocated in Turkey.
  • They were spread across seven Internet service providers (ISPs) topped by Tamatiya EOOD, which accounted for 12 IP addresses. Limenet placed second with five. The five remaining IP addresses were split among the same number of ISPs, namely, Intelligence Hosting LLC, MortalSoft Ltd., myLoc Managed IT AG, Plasma DC Solutions LLC, and SkyLink Data Center BV.

Mirai.TBOT IoC List Expansion Results

Now, on to finding more Mirai.TBOT traces in the DNS.

Our search for email-connected domains started with WHOIS History API searches that led to the discovery of nine email addresses in the domain IoCs’ historical WHOIS records, three of which were public.

Reverse WHOIS API searches showed that one public email address appeared in the current WHOIS record of one domain—qqmmqqw[.]cn—after duplicates and those already tagged as IoCs were removed.

Next, we performed DNS lookups on the 112 domain IoCs that enabled us to collate 13 IP addresses after duplicates and those that were already part of the original IoC list were filtered out.

IP geolocation lookups for the 13 additional IP addresses showed that:

  • They were spread across four geolocation countries topped by the Netherlands, which accounted for eight IP addresses. The U.S. took the second spot with three IP addresses while the remaining two pointed to Belgium and Egypt as their origins.

    Twelve of the additional IP addresses shared three of the IoCs’ geolocation countries—the Netherlands, the U.S., and Belgium.

  • They were administered by four ISPs—Limenet (8 IP addresses), Intelligence Hosting LLC (3 IP addresses), and Alsycon B.V. and Stark Industries Solutions Ltd. (1 IP address each).

  • The built-in Threat Intelligence API engine results also revealed that 11 of them were associated with various threats. Take a look at five examples below.

    IP ADDRESSESASSOCIATED THREAT TYPES
    185[.]194[.]176[.]137Attack
    45[.]95[.]146[.]126Attack
    Generic
    Malware
    85[.]209[.]134[.]96AttackMalware
    91[.]92[.]241[.]184Attack
    Malware
    Spam
    91[.]92[.]244[.]7Attack
    Malware
    Spam

Reverse IP lookups for the 35 IP addresses—22 IoCs and 13 additional—showed that 26 of them could be dedicated. They accounted for six IP-connected domains after duplicates, the IoCs, and email-connected domains were removed.

All the six IP-connected domains turned out to be malicious based on threat intelligence lookups. One—hailnet[.]online—proved interesting in that it seemingly hosted or led to a satirical Federal Bureau of Investigation (FBI) website according to a screenshot lookup.

Screenshot of the IP-connected domain hailnet[.]online

As our final step, we looked for string-connected domains via Domains & Subdomains Discovery using the Starts with parameter. We found 6,863 such domains containing these 34 text strings that appeared in the domain IoCs:

  • asdjjasdhioasdia
  • cjfop
  • czbrwa
  • ede.
  • etbez
  • fawzpp
  • fszki
  • fuckmy
  • getcred
  • gottalovethe
  • gropethe
  • hiakamai
  • hinetlab
  • homehitter
  • iarrfd
  • icansinga
  • iliveona
  • infectedchink
  • jxhfn
  • ksarpo
  • metbez
  • oke.
  • qcgbs
  • rdtqq
  • sdfsd
  • shetoldmeshewas12
  • skid.
  • suckmytoe
  • ulkvb
  • ulkvmb
  • vrodpw
  • wnisyi
  • yellowskin
  • youra.

While none of them turned out to be malicious, some could be considered suspicious in that they seemed to be mimicking three often impersonated companies—Facebook, Microsoft, and WordPress—based on their screenshots.

Screenshot of string-connected domain ede[.]auto[.]pl
Screenshot of string-connected domain ****mywife[.]co[.]uk
Screenshot of string-connected domains getcreditordietryin[.]com and getcreditordietrying[.]com
Screenshot of string-connected domains sdfsdf[.]shop and sdfsdgh[.]shop
Screenshot of string-connected domains sdfsdsdaf68[.]com and sdfsdsone[.]xyz
Screenshot of string-connected domain getcredentialing[.]com

Our Mirai.TBOT IoC expansion allowed us to obtain 6,870 unreported potentially connected threat artifacts. We also uncovered several malicious web properties, including 11 IP addresses to which some of the domain IoCs resolved and six IP-connected domains.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com