Regions Targeted: Not specified
Related Families: ddaemon
Key Takeaways
What is PumaBot?
PumaBot’s infection chain begins with retrieving a target list from an external C2 server. The malware then attempts to brute-force SSH credentials across these IPs, focusing on devices with open SSH ports. Upon successful login, it deploys its binary to the compromised system, often writing itself to /lib/redis to masquerade as a legitimate Redis service. This deception is furthered by creating systemd service files, such as redis.service or mysqI.service (notably with a capitalized ‘I’ to mimic MySQL), ensuring persistence across system reboots. The use of native Linux tools and system locations demonstrates an intent to blend into legitimate processes, complicating detection by traditional security solutions.
The botnet’s functionality extends beyond initial compromise. PumaBot collects system information, including OS name, kernel version, and architecture, via commands like `uname -a`. This data, along with the victim’s IP, port, username, and password, is exfiltrated to the C2 server in a JSON payload, using a custom HTTP header. The malware then awaits commands, with observed instructions including “xmrig” and “networkxm,” indicating cryptocurrency mining as a primary objective. These commands lack full path specifications, suggesting additional payloads are downloaded or unpacked on the infected host, further expanding the attack’s scope.
PumaBot employs advanced evasion tactics to avoid detection. It includes fingerprinting logic to bypass honeypots and restricted environments, notably checking for the string “Pumatronix,” a manufacturer of surveillance and traffic camera systems. This suggests either a deliberate focus on or exclusion of specific IoT devices, potentially tailoring its campaign to surveillance systems. By avoiding automatic propagation like a worm, PumaBot operates as a semi-automated botnet, relying on C2-driven target selection and brute-forcing to expand its reach.
Related binaries uncovered during Darktrace’s analysis include *ddaemon*, a Go-based backdoor that retrieves and executes *networkxm*, and *installx.sh*, a shell script that downloads additional payloads from domains like “1.lusyn[.]xyz” and clears bash history to cover its tracks. These components indicate a broader campaign leveraging multiple tools to maximize compromise and persistence. PolySwarm analysts consider PumaBot to be an emerging threat.
IOCs
PolySwarm has multiple samples associated with this activity.
a5125945d7489d61155723259990c168db01dfedcd76a2e1ba08caa3c4532ca3
426276a76f20b823e896e3c08f1c42f3d15a91a55c3613c7b3bdfbef0bbed9a9
0957884a5864deb4389da3b68d3d2a139b565241da3bb7b9c4a51c9f83b0f838
You can use the following CLI command to search for all PumaBot samples in our portal:
$ polyswarm link list -f PumaBot
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.