ELF_ROOPRE.E
Backdoor.Linux.Roopre.d (Kaspersky), ELF/Roopre-A (Sophos); Backdoor.Linux.Roopre (Ikarus); Linux/BackDoor-Roopre.gen.a (McAfee); Linux/Roopre.A (ESET-NOD32)
Linux
Threat Type: Backdoor
Destructiveness: No
Encrypted: Yes
In the wild: Yes
OVERVIEW
Downloaded from the Internet, Dropped by other malware
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.
TECHNICAL DETAILS
27,304 bytes
ELF
Yes
11 Oct 2014
Compromises system security
Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Backdoor Routine
This backdoor executes the following commands from a remote malicious user:
- Q - Sends additional data and information
- P - Sends current state of running tasks, or count of current working threads
- R - Refresh the session with C&C server
- F - Download file drom C&C server
- L - Set maximum number of threads and connection timeout, or load a shared library
- S - Stop all threads executing the loaded shared library routines
- G - Create threads to execute exported functions of loaded shared libraries
It connects to the following websites to send and receive information:
- http://{BLOCKED}atelit.biz/ololo.php
SOLUTION
9.700
11.204.06
11 Oct 2014
11.205.00
11 Oct 2014
Scan your computer with your Trend Micro product and note files detected as ELF_ROOPRE.E
Did this description help? Tell us how we did.