spacemanspiff
Occasional Visitor
I've just become aware that my Asus RT-AX86U which is running the latest Merlin firmware (3004.388.9) might be compromised. Potentially by TheMoon malware or Alogin. I was made aware that port 53 is open, however, I don't have any port forwards enabled for 53 so I can't see why it would be open.
This seems highly suspicious. Furthermore, it appears that I'm serving DNS because if I run dig as follows I get this result:
~$ dig +short @119.2xx.xxx.xxx google.com
142.251.221.78
That seems like it should not be happening and is a red flag to me.
Then if I look in IPTables I see some entries that look really suspect, too:
And this too:
I had a quick look for obvious signs of TheMoon in find/tmp and didn't see anything obvious - paste here https://pastebin.com/LR3CJzpf
Also, taking a look at the output of 'ps' I didn't see .nttpd or .sox running which is the normal culprit. Of course a newer/better variant of TheMoon might just be better disguising itself so here's my 'ps' output if anyone wants to look - https://pastebin.com/MiAHgyP4
I don't have my admin gui open to the WAN and never did so in the past. I do run IPsec and OpenVPN and I'm also seeing some suspicious login attempts via IPSec.
I'd really like to know what is going on and try to figure out the source/vector for this. I'm also unsure how to clean this up, but I suspect factory reset, flashing again and another factory reset should do the job?
This seems highly suspicious. Furthermore, it appears that I'm serving DNS because if I run dig as follows I get this result:
~$ dig +short @119.2xx.xxx.xxx google.com
142.251.221.78
That seems like it should not be happening and is a red flag to me.
Then if I look in IPTables I see some entries that look really suspect, too:
Code:
Chain OUTPUT_IP (1 references)
target prot opt source destination
logdrop_ip all -- anywhere 193.201.224.0/24
logdrop_ip all -- anywhere 245-120-15-51.instances.scw.cloud
logdrop_ip all -- anywhere li1019-134.members.linode.com
logdrop_ip all -- anywhere 190.115.18.28
logdrop_ip all -- anywhere 51-159-52-250.rev.poneytelecom.eu
logdrop_ip all -- anywhere 190.115.18.86
And this too:
Code:
Chain PTCSRVWAN (0 references)
target prot opt source destination
DROP tcp -- 92.255.85.107 anywhere tcp dpt:ssh
DROP tcp -- 92.255.85.253 anywhere tcp dpt:ssh
DROP tcp -- 185.42.12.240 anywhere tcp dpt:ssh
DROP tcp -- 92.255.85.37 anywhere tcp dpt:ssh
DROP tcp -- 185.7.214.37 anywhere tcp dpt:ssh
I had a quick look for obvious signs of TheMoon in find/tmp and didn't see anything obvious - paste here https://pastebin.com/LR3CJzpf
Also, taking a look at the output of 'ps' I didn't see .nttpd or .sox running which is the normal culprit. Of course a newer/better variant of TheMoon might just be better disguising itself so here's my 'ps' output if anyone wants to look - https://pastebin.com/MiAHgyP4
I don't have my admin gui open to the WAN and never did so in the past. I do run IPsec and OpenVPN and I'm also seeing some suspicious login attempts via IPSec.
I'd really like to know what is going on and try to figure out the source/vector for this. I'm also unsure how to clean this up, but I suspect factory reset, flashing again and another factory reset should do the job?