Kimwolf Android TV Botnet ENS-Based C2 Evasion, TLS+ECDSA C2... #1695
+53
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Overview & Scale
Kimwolf is a large-scale Android botnet (primarily TV boxes/TVs/set-top boxes, but also tablets) attributed with high confidence to the Aisuru group. It is implemented as a statically linked ARM ELF (e.g. MD5
3e1377869bd6e80e005b71b9e991c060, packed with UPX) built via Android NDK and side-loaded by malicious APKs. The C2 domain14emeliaterracewestroxburyma02132[.]subriefly reached #1 on Cloudflare domain rankings, evidencing m...🔧 Technical Details
1. Android APK Loader: Embedding and Executing Native Botnet ELFs as Root
The blog describes a reusable pattern for turning an Android APK into a loader for native botnet clients. An attacker embeds an ELF shared object or binary (e.g.
ji.so,libdevice.so) into the APK resources underres/raw/(often referenced asR.raw.libniggakernel). On install/boot, a BootReceiver runs, extracts the raw resource into the app’s data directory with a chosen name (e.g.niggakernel), sets execute permissions, and then callssuto launch it with root privileges. Because many TV boxes ship pre-rooted or with insecure ROMs, this provides reliable system-level persistence: the bot runs at boot and has full control. This loader pattern can be repurposed for any native payload—RATs, miners, or alternative botnets—so long as the environment offers a workingsuor exploitable privilege-escalation...🤖 Agent Actions
Summary:
src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md, detailing the APK-based native loader, mutex sockets, ARM NEON stack-XOR obfuscation workflow (with flare_emu automation), DNS-over-TLS plus XOR IP derivation, ENS/EtherHiding decoding, and the TLS+ECDSA authenticated command channel/Mirai-style tasking.Tests: Not applicable (documentation-only changes).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).