Found & handling a range of FreeBSD & Linux machines infected with this trojan.
Is a compiled ELF/x32 on a successful hacked machine.
Compilation traced to gcc, Linux is main target, xBSD or other *NIX system supported Linux compatibility also can be affected.
It was faking bash as "-bash" in process (ps) at xBSD which doesn't used that shell so it was spotted easily.
VT Summary: (LINK)
Code: Select all
Summary of this trojan:
SHA256: 6e4586e5ddf44da412e05543c275e466b9da0faa0cc20ee8a9cb2b2dfd48114e
SHA1: 13aa008b0f3c9e92450979ee52cb46accf49aff3
MD5: 6547b92156b39cb3bb5371b17d2488f2
File size: 18.5 KB ( 18902 bytes )
File name: -bash
File type: ELF
Tags: elf
Detection ratio: 7 / 47
Analysis date: 2013-05-30 11:37:36 UTC ( 4 minutes ago )
F-Secure : Generic.Malware.IFg.985D9435
GData : ELF:Tsunami-L
MicroWorld-eScan : Generic.Malware.IFg.985D9435
Avast : ELF:Tsunami-L [Trj]
Kaspersky : Backdoor.Linux.Tsunami.gen
BitDefender : Generic.Malware.IFg.985D9435
Emsisoft : Generic.Malware.IFg.985D9435 (B)
Code: Select all
IMPORTANT! Flooding Operation is implemented in the program, w/ below HTTP header:
1. Usage the INET socket to make internet connection via IRC, HTTP or FTP
2. Locking itself in specific PID to avoid double starts/killed.
3. Forking support functionalities.
4. Remote control Bot-IRC functions like:
a. Remote FTP access for infecting further
b. Commands like: NICK, SERVER, KILL, GET, HELP, ETC, SH; are the basic commmands used
c. Custom commands like; _352, _376, _433 for botnet comm purpose.
d. Flooding (DoS/DDoS) tools.
Code: Select all
The sample making IRC connection to the below host:
GET /%s HTTP/1.0\
Connection: Keep-Alive
User-Agent: Mozilla/4.75 [en] (X11; U; Linux 2.2.16-3 i686)
Host: %s:80\
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Encoding: gzip\r\nAccept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
(Following by long characters assembled/sent from botmaster via IRC)
Code: Select all
And tried to download from below hosts by FTP:
cvv4you.ru
188.190.124.120
188.190.124.81
Code: Select all
Locking PID:
Hostname: wf.networksolution.com
Address: 205.178.189.131
Code: Select all
IRC commands used (it used IDENT):
// PID hooks:
waitpid
/tmp/tan.pid
Lockfile found. Exiting.
- bash // malware process..
Code: Select all
Logged on connectivity effort:
PRIVMSG %s :Receiving file.
PRIVMSG %s :Saved as %s
PRIVMSG %s :NICK <nick>
PRIVMSG %s :Nick cannot be larger than 9 characters.
NICK %s
PRIVMSG %s :Unable to resolve %s
PRIVMSG %s :MOVE <server>
NOTICE %s :NICK <nick> = Changes the nick of the client
NOTICE %s :SERVER <server> = Changes servers
NOTICE %s :KILL = Kills the client
NOTICE %s :GET <http address> <save as> = Downloads a file off the web and saves it onto the hd
NOTICE %s :HELP = Displays this
NOTICE %s :IRC <command> = send_msgs this command to the server
NOTICE %s :SH <command> = Executes a command
NICK
SERVER
KILL
HELP
IRC
PRIVMSG %s :%s
MODE %s -ix
NICK %s
JOIN %s :%s
WHO %s
PONG %s
PRIVMSG %s :I'm having a problem resolving my host, someone will have to SPOOFS me manually.
PRIVMSG
PING
Code: Select all
More details analysis is in >> This Link// for IRC....
tcp4 0 0 x.x.x.x.59314 188.190.124.81.ircd SYN_SENT
tcp4 0 0 x.x.x.x.60606 188.190.124.81.ircd SYN_SENT
tcp4 0 0 x.x.x.x.46914 188.190.124.81.ircd SYN_SENT
tcp4 0 0 x.x.x.x.53001 188.190.124.81.ircd SYN_SENT
tcp4 0 0 x.x.x.x.50123 188.190.124.81.ircd SYN_SENT
tcp4 0 0 x.x.x.x.36833 188.190.124.81.ircd SYN_SENT
[...]
Active Internet connections
Proto Recv-Q Send-Q Local Address Foreign Address (state)
----------------------------------------------------------------------------
// for FTP....
tcp4 0 0 x.x.x.x.64873 wf.networksoluti.ftp SYN_SENT
tcp4 0 0 x.x.x.x.64873 wf.networksoluti.ftp SYN_SENT
#MalwareMUSTDie!