GorillaBot: Technical Analysis and Code Similarities with Mirai
March 25, 2025, 6:50 p.m.
Description
GorillaBot is a newly discovered Mirai-based botnet that has launched over 300,000 attacks across more than 100 countries, targeting various industries including telecommunications, finance, and education. It reuses Mirai's core logic while adding custom encryption and evasion techniques. The malware uses raw TCP sockets and a custom XTEA-like cipher for C2 communication, implements anti-debugging and anti-analysis checks, and authenticates to its C2 server using a SHA-256-based token. Attack commands are encoded, hashed, and processed using a Mirai-style attack_parse function. GorillaBot's sophistication highlights the ongoing evolution of legacy malware and the need for advanced analysis tools to combat such threats.
Tags
Date
- Created: March 25, 2025, 5:38 p.m.
- Published: March 25, 2025, 5:38 p.m.
- Modified: March 25, 2025, 6:50 p.m.
Indicators
- b482c95223df33f43b7cfd6a0d95a44cc25698bf752c4e716acbc1ac54195b55
- 193.143.1.70
- 193.143.1.59
Attack Patterns
- GorillaBot
- Mirai
- T1132.001
- T1573.001
- T1497.001
- T1571
- T1014
- T1095
- T1070.004
- T1562.001
- T1016
- T1082
- T1140
- T1027
Additional Informations
- Education
- Finance
- Telecommunications