ELF_MYK.A


 PLATFORM:

Linux

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Others

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This malware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.

  TECHNICAL DETAILS

File Size:

188,597 bytes

File Type:

ELF

Memory Resident:

Yes

Initial Samples Received Date:

15 Feb 2014

Arrival Details

This malware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It arrives as a component bundled with malware/grayware packages.

Download Routine

This malware saves the files it downloads using the following names:

  • {malware path}\{random value}

It downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.

NOTES:

This is the Trend Micro detection for files that can be used for denial of service attack.

  SOLUTION

Minimum Scan Engine:

9.700

FIRST VSAPI PATTERN FILE:

10.614.04

FIRST VSAPI PATTERN DATE:

18 Feb 2014

VSAPI OPR PATTERN File:

10.615.00

VSAPI OPR PATTERN Date:

19 Feb 2014

NOTES:

The Minimum Scan Engine refers to the earliest Trend Micro scan engine version guaranteed to detect this threat. However, Trend Micro strongly recommends that you update to the latest version in order to get comprehensive protection. Download the latest scan engine here.

Scan your system with Trend Micro product and delete all files detected as ELF_MYK.A. To do this, Trend Micro customers must download the latest pattern file and scan their system.

Trend Micro offers best-of-breed antivirus and content-security solutions for your corporate network, small and medium business, mobile device or home PC.


Did this description help? Tell us how we did.