Analisado por: Joshua Paul Ignacio   

 

ELF/BruteForce.I!tr (FORTINET), Trojan:Linux/CoinMiner!rfn (MICROSOFT)

 Plataforma:

Linux

 Classificao do risco total:
 Potencial de dano:
 Potencial de distribuição:
 infecção relatada:
 Impacto no sistema: :
 Exposição das informações:
Baixo
Medium
Alto
Crítico

  • Tipo de grayware:
    Trojan

  • Destrutivo:
    Não

  • Criptografado:
     

  • In the Wild:
    Sim

  Visão geral

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  Detalhes técnicos

Tipo de compactação: 1,893,644 bytes
Tipo de arquivo: ELF
Data de recebimento das amostras iniciais: 26 junho 2020

Übertragungsdetails

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Andere Details

Es macht Folgendes:

  • Upon executing, it will display the following list of arguments:
    • Use: scan [OPTIONS] [[USER PASS]] FILE] [IPs/IPs Port FILE]
    • Options:
      • -t [NUMTHREADS]: Change the number of threads used. Default is 10
      • -m [MODE]: Change the way the scan works. Default is 1
      • -f [FINAL SCAN]: Does a final scan on found servers. Default is 2
      • Use -f 1 for A.B class /16. Default is 2 for A.B.C /24
      • -i [IP SCAN]: use -i 0 to scan ip class A.B. Default is 1
      • if you use -i 0 then use ./scan -p 22 -i 0 p 192.168 as agrument for ip file
      • -m 0 for non selective scanning
      • -P 0 leave default password unchanged. Changes password by default.
      • -s [TIMEOUT]: Change the timeout. Default is 6
      • -S [2ndTIMEOUT]: Change the 2nd timeout. Default is 6
      • -p [PORT]: Specify another port to connect to. 0 for multiport
      • -c [REMOTE-COMMAND]: Command to execute on connect. Use ; or && with commands
      • -h : Show this help
      • -H 1: For extra help

  Solução

Mecanismo de varredura mínima: 9.850
Primeiro arquivo padrão VSAPI: 15.954.08
Data do lançamento do primeiro padrão VSAPI: 26 junho 2020
VSAPI OPR Pattern Version: 15.955.00
VSAPI OPR Pattern veröffentlicht am: 27 junho 2020

Durchsuchen Sie Ihren Computer mit Ihrem Trend Micro Produkt, und löschen Sie Dateien, die als Trojan.Linux.SSHBRUTE.UWEJT entdeckt werden. Falls die entdeckten Dateien bereits von Ihrem Trend Micro Produkt gesäubert, gelöscht oder in Quarantäne verschoben wurden, sind keine weiteren Schritte erforderlich. Dateien in Quarantäne können einfach gelöscht werden. Auf dieser Knowledge-Base-Seite finden Sie weitere Informationen.


Participe da nossa pesquisa!