This version of the malware attempts to gain access to systems by using SSH channels to guess user passwords, and then installs itself in different directories under the hidden folder “z”.
Commands like “cp” and “chmod” is used to execute the process.
Below are examples of the commands:
cp /bin/echo /home/.z && >/home/.z && cd /home/; rm -rf .i; cp .z .i; cp .i .d; chmod 777 .i; chmod 777 .d;
cp /bin/echo /var/tmp/.z && >/var/tmp/.z && cd /var/tmp/; rm -rf .i; cp .z .i; cp .i .d; chmod 777 .i; chmod 777 .d;
cp /bin/echo /home/.z && >/home/.z && cd /home/; rm -rf .i; cp .z .i; cp .i .d; chmod 777 .i; chmod 777 .d;
cp /bin/echo /etc/.z && >/etc/.z && cd /etc/; rm -rf .i; cp .z .i; cp .i .d; chmod 777 .i; chmod 777 .d;
This variant also uses the “uname” system call to query DNS lookup.
It executes the “systemctl” command used for controlling the systemd system and service manager.
It also deletes log files, and seems to delete itself at the end of the attack.
The research team has identified three unique hashes for this version of the malware:
f8ef3fcfba41573fac115af669c0b712dcdf2d38673fb62abce850fa63ac8b83
d5d15893674012d0caf1323f3dcaf5cba00079b33f4805bfa6283b1500612644
04c903b14210f7b38f2ae797755b27e80a37838ebb83976367ac48b258135ed8
Snort rules created by Proofpoint were found in VirusTotal and are related to the discussed above attack:
1. ET DROP Dshield Block Listed Source group 1 at Proofpoint Emerging Threats Open
2. ET DNS Query for .cc TLD at Proofpoint Emerging Threats Open