My Account Login

ANY.RUN Publishes In-Depth Technical Analysis of GorillaBot, a Mirai-Based Botnet Targeting Over 100 Countries

DUBAI, DUBAI, UNITED ARAB EMIRATES, March 25, 2025 /EINPresswire.com/ -- ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, has published a comprehensive technical breakdown of GorillaBot, a newly discovered botnet based on the infamous Mirai source code. The botnet has already launched over 300,000 attacks globally and is actively targeting sectors including telecommunications, finance, and education.

๐€ ๐๐ž๐ฐ ๐…๐š๐œ๐ž ๐จ๐Ÿ ๐š๐ง ๐Ž๐ฅ๐ ๐“๐ก๐ซ๐ž๐š๐ญ

GorillaBot reuses significant portions of Miraiโ€™s original code but introduces its own enhancements, including custom encryption schemes, raw TCP communication, and advanced anti-analysis techniques.

It stands out for its ability to evade detection in containerized environments and honeypots, making it a more elusive threat than its predecessors.

๐Š๐ž๐ฒ ๐“๐š๐ค๐ž๐š๐ฐ๐š๐ฒ๐ฌ ๐Ÿ๐ซ๐จ๐ฆ ๐ญ๐ก๐ž ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ

ยท ๐—•๐˜‚๐—ถ๐—น๐˜ ๐—ผ๐—ป ๐— ๐—ถ๐—ฟ๐—ฎ๐—ถ ๐—ฐ๐—ผ๐—ฑ๐—ฒ: GorillaBot heavily reuses core logic from Mirai while introducing its own improvements.

ยท ๐—”๐—ฑ๐˜ƒ๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—–๐Ÿฎ ๐—ฐ๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Utilizes raw TCP sockets and a custom XTEA-like cipher for encrypting server addresses and communication.

ยท ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—บ๐—ฒ๐—ฐ๐—ต๐—ฎ๐—ป๐—ถ๐˜€๐—บ: Combines a decrypted hardcoded array and a server-provided magic value, then hashes it with SHA-256 for authentication.

ยท ๐—˜๐˜ƒ๐—ฎ๐˜€๐—ถ๐—ผ๐—ป ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ๐˜€: Performs environment checks to avoid honeypots and Kubernetes containers, exiting immediately if detected.

ยท ๐—”๐—ป๐˜๐—ถ-๐—ฑ๐—ฒ๐—ฏ๐˜‚๐—ด๐—ด๐—ถ๐—ป๐—ด ๐—ฏ๐—ฒ๐—ต๐—ฎ๐˜ƒ๐—ถ๐—ผ๐—ฟ: Uses TracerPid checks and SIGTRAP handling to avoid analysis tools.

ยท ๐—ข๐—ฏ๐—ณ๐˜‚๐˜€๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐˜€: Encrypts internal configuration using a Caesar cipher and a custom block cipher.

To explore the full technical breakdown of GorillaBot, including behavior analysis, code insights, and relevant IOCs visit the ANY.RUN blog.

๐€๐›๐จ๐ฎ๐ญ ๐€๐๐˜.๐‘๐”๐

ANY.RUN is a cloud-based cybersecurity platform used by over 500,000 professionals worldwide. It offers an interactive malware sandbox along with powerful threat intelligence capabilities, enabling real-time behavioral analysis across Windows, Linux, and Android environments. From dynamic analysis to uncovering IOCs and tracking threat actors, ANY.RUN helps security teams investigate threats faster, collaborate more effectively, and stay ahead of emerging malware.

The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
Twitter
LinkedIn

View full experience

Distribution channels: Banking, Finance & Investment Industry, Business & Economy, IT Industry, International Organizations, Technology