A newly discovered Mirai variant has been created using an open-source project that makes the process of cross compilation very easy, Symantec reports.
Mirai, a piece of malware that first emerged in the fall of 2016, targets a broad range of Internet of Things (IoT) devices to ensnare them into botnets capable of launching massive distributed denial of service (DDoS) attacks.
Numerous Mirai variants have emerged since the malware’s source code was leaked in October 2016, targeting a broader range of devices and increasing resilience. Some of the most recent Mirai iterations include Wicked, Satori, Okiru, Masuta, and others.
Now, Symantec says its researchers discovered a Mirai variant compatible with multiple architectures. More robust compared to previously observed iterations, the sample has been built using the open-source project called Aboriginal Linux.
The platform has been designed to make cross compilation a simple task, allowing software authors to create images targeting multiple architectures, including ARM, MIPS, PowerPC, and x86.
Apparently, this is exactly why the developers behind the new Mirai variant chose Aboriginal Linux too. When compiled using the open source project, the malware can be executed on a variety of devices, including routers, IP cameras, other types of connected products, and Android devices.
“Given that the existing code base is combined with an elegant cross compilation framework, the resultant malware variants are more robust and compatible with multiple architectures,” Symantec researcher Dinesh Venkatesan explains.
The observed sample includes functionality consistent with Mirai’s behavior, the security researcher says. The infection starts with a shell script on a vulnerable device, which attempts to download and run individual executables until the binary compliant with the current architecture is found.
When executed on an infected device, the Mirai payload attempts to spread to devices with default credentials or vulnerabilities. The new sample was observed scanning for over 500,000 randomly generated IP addresses and attempting to deliver a raw packet data over port 23.
While the Aboriginal Linux project is not malicious, this is yet another example of how malware authors leverage open-source software for their nefarious purposes, Venkatesan points out.