Trojan.SH.BROOTKIT.B
Trojan.Linux.Rootkit (IKARUS), BV:Rootkit-C [Rtk] (AVAST)
Linux
Threat Type: Trojan
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
Dropped by other malware
This Trojan deletes itself after execution.
TECHNICAL DETAILS
1,307 bytes
Other
Yes
19 Feb 2020
Deletes files
Arrival Details
This malware arrives via the following means:
- Downloaded by Trojan.SH.BROOTKIT.A
Installation
This Trojan adds the following folders:
- /home/$USER/... → Non-Root Privilege
Other System Modifications
This Trojan deletes the following files:
- /tmp/.../brootkit.sh
Other Details
This Trojan does the following:
- It creates a copy of brootkit.sh (detected as Trojan.SH.BROOTKIT.C) on the following directories:
- /etc/profile.d/emacs.sh → overwrites the original emacs.sh
- /usr/include/... → Root Privilege
- /home/$USER/... → Non-Root Privilege
It deletes itself after execution.
SOLUTION
9.850
15.698.02
19 Feb 2020
15.699.00
20 Feb 2020
Scan your computer with your Trend Micro product to clean files detected as Trojan.SH.BROOTKIT.B. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.