{"id":16826,"date":"2023-09-09T12:07:20","date_gmt":"2023-09-09T12:07:20","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=16826"},"modified":"2024-05-30T21:37:45","modified_gmt":"2024-05-30T21:37:45","slug":"mirai-pandora-infects-android-os","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/mirai-pandora-infects-android-os\/","title":{"rendered":"Mirai variant &#8220;Pandora&#8221; infects Android TV for DDoS attacks."},"content":{"rendered":"<p>A new <strong>variant of the Mirai malware<\/strong> botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively used for media streaming by millions of people. The present <strong>Trojan is a fresh edition of the &#8216;Pandora&#8217; backdoor<\/strong> initially identified in 2015, per the analytics.<\/p>\n<p>The campaign <strong>targets low-cost Android TV boxes<\/strong> such as Tanix TX6, MX10 Pro 6K, and H96 MAX X3. These devices have quad-core processors that can launch <a href=\"https:\/\/gridinsoft.com\/ddos\">powerful DDoS attacks<\/a>, even in small swarm sizes.<\/p>\n<h2>Mirai Botnet Aims Android-based TV Boxes<\/h2>\n<p><a href=\"https:\/\/howtofix.guide\/dark-mirai-botnet-exploits-rce-vulnerability-in-tp-link-routers\/\" target=\"_blank\" rel=\"noopener nofollow\">Mirai Botnet can infect devices<\/a> via <strong>malicious firmware updates<\/strong> signed with publicly available test keys or malicious apps. Which undoubtedly distributed on domains that target <strong>users interested in pirated content<\/strong>. In the first case, firmware updates are either installed by resellers of the devices or users are <strong>tricked into downloading them<\/strong> from websites. Then, they promise unrestricted media streaming or better application compatibility.<\/p>\n<p>The &#8216;<code>boot.img<\/code>&#8216; file contains the kernel and ramdisk components loaded during Android boot-up. It makes it an excellent persistence <strong>mechanism for the malicious service<\/strong>.<\/p>\n<figure id=\"attachment_16846\" aria-describedby=\"caption-attachment-16846\" style=\"width: 601px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/09\/service.webp\" alt=\"Mirai service\" width=\"601\" height=\"265\" class=\"size-full wp-image-16846\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/09\/service.webp 601w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/09\/service-300x132.webp 300w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><figcaption id=\"caption-attachment-16846\" class=\"wp-caption-text\">Malicious service<\/figcaption><\/figure>\n<p>The second distribution channel involves the <strong>use of pirated content apps<\/strong>. They also offer access to collections of copyrighted TV shows and movies for free or at a low cost. Security experts have identified Android apps that <strong>spread the new Mirai malware<\/strong> variant to infected devices. Here is an example:<\/p>\n<figure id=\"attachment_16847\" aria-describedby=\"caption-attachment-16847\" style=\"width: 459px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/09\/apps-459x1024.webp\" alt=\"Android apps\" width=\"350\" height=\"1024\" class=\"size-large wp-image-16847\" title=\"\"><figcaption id=\"caption-attachment-16847\" class=\"wp-caption-text\">Site dropping malware<\/figcaption><\/figure>\n<p>In this case, the malicious apps surreptitiously start the &#8216;<code>GoMediaService<\/code>&#8216; during the initial launch and set it to auto-start when the device boots up.<\/p>\n<p>When the &#8216;<code>gomediad.so<\/code>&#8216; service is called, it unpacks multiple files, including a command-line interpreter that runs with elevated privileges (&#8216;<code>Tool.AppProcessShell.1<\/code>&#8216;) and an installer for the Pandora backdoor (&#8216;<code>.tmp.sh<\/code>&#8216;).<\/p>\n<figure id=\"attachment_16848\" aria-describedby=\"caption-attachment-16848\" style=\"width: 220px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/09\/media.webp\" alt=\"gomediad.so\" width=\"220\" height=\"284\" class=\"size-full wp-image-16848\" title=\"\"><figcaption id=\"caption-attachment-16848\" class=\"wp-caption-text\">GoMedia service structure<br \/><\/figcaption><\/figure>\n<p>After being activated, the <a href=\"https:\/\/gridinsoft.com\/backdoor\">backdoor establishes communication<\/a> with the C2 server, and replaces the HOSTS file. After that, it updates itself and then enters standby mode, waiting for instructions from its operators. The <strong>malware can launch DDoS attacks<\/strong> using the TCP and UDP protocols, such as generating SYN, ICMP, and DNS flood requests. It can also open a reverse shell, <strong>mount system partitions for modification<\/strong>, and perform other functionalities.<\/p>\n<h2>IoC Mirai Botnet<\/h2>\n<ul><li>Malware.U.Mirai.tr: <a href='\/online-virus-scanner\/id\/96b087abf05bb6c2c1dd6a1c9da460d57564cc66473ca011f85971752a112ce1'>96b087abf05bb6c2c1dd6a1c9da460d57564cc66473ca011f85971752a112ce1<\/a><\/li><li>Malware.U.Mirai.bot: <a href='\/online-virus-scanner\/id\/624f4966636968f487627b6c0f047e25b870c69040d3fb7c5fb4b79771931830'>624f4966636968f487627b6c0f047e25b870c69040d3fb7c5fb4b79771931830<\/a><\/li><li>Malware.U.Mirai.bot: <a href='\/online-virus-scanner\/id\/613f03b52910acb8e25491ca0bfe7d27065221c180e25d16e7457e4647a73291'>613f03b52910acb8e25491ca0bfe7d27065221c180e25d16e7457e4647a73291<\/a><\/li><li>Malware.U.Mirai.bot: <a href='\/online-virus-scanner\/id\/22f269a866c96f1eec488b0b3aebe9f8024ae455255a4062e6a5e031dfd16533'>22f269a866c96f1eec488b0b3aebe9f8024ae455255a4062e6a5e031dfd16533<\/a><\/li><\/ul>\n<h2>What devices are at risk?<\/h2>\n<p>Budget-friendly Android TV boxes often have an uncertain journey from manufacturer to consumer. It leaves the <strong>end-user unaware of their origins<\/strong>, potential firmware modifications, and the various hands they&#8217;ve been through.<\/p>\n<p>Even cautious consumers who retain the original ROM and are selective about app installations <strong>face a lingering risk of preloaded malware<\/strong> on their devices. It is advisable to opt for streaming devices from trusted brands like Google Chromecast, Apple TV, NVIDIA Shield, Amazon Fire TV, and Roku Stick.<\/p>\n<h2>Safety recommendations<\/h2>\n<p>For Android TV users, installing <strong>apps only from the official app store<\/strong> is advisable. It is also essential to pay attention to the permissions requested by the app. If your app requests access to your phonebook and geo-location, it is best to <strong>avoid using it as it could be malware<\/strong>. Additionally, it is crucial not to download or install any hacked apps, as their contents are often <a href=\"https:\/\/gridinsoft.com\/blogs\/android-malware\/\">infected with malware<\/a> of some kind.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new variant of the Mirai malware botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively used for media streaming by millions of people. The present Trojan is a fresh edition of the &#8216;Pandora&#8217; backdoor initially identified in 2015, per the analytics. The campaign targets low-cost Android TV boxes such as [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":16849,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[625,7,8,453],"class_list":{"0":"post-16826","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-backdoor","9":"tag-botnet","10":"tag-ddos","11":"tag-mirai"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/09\/GS_Blog_banner_Mirai-variant-Pandora-infects-Android-TV-for-DDoS-attacks_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=16826"}],"version-history":[{"count":15,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16826\/revisions"}],"predecessor-version":[{"id":16919,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16826\/revisions\/16919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/16849"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=16826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=16826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=16826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}