ELF_MANUST.A
Kaspersky: Backoor.Linux.Tsunami.gen
Linux
Threat Type: Backdoor
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
Downloaded from the Internet
This is involved in an exploit attack targeting a critical vulnerability of Ruby on Rails. It connects to an IRC server where it can receive and perform commands from remote malicious attackers, as well as make the affected system part of its botnet. Affected users may find the security of their systems compromised.
To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
It connects to Internet Relay Chat (IRC) servers.
TECHNICAL DETAILS
TCP port 6667 (IRCU)
Varies
ELF
Yes
31 May 2013
Connects to URLs/IPs, Compromises system security
Arrival Details
This backdoor may be dropped by other malware.
It may be unknowingly downloaded by a user while visiting malicious websites.
Backdoor Routine
This backdoor connects to any of the following Internet Relay Chat (IRC) servers:
- {BLOCKED}u.ru
- {BLOCKED}.{BLOCKED}.124.120
It accesses a remote Internet Relay Chat (IRC) server where it receives the following commands from a remote malicious user:
- NICK {nick} - change IRC nick
- SERVER {server} - change IRC Server
- KILL - terminate itself
- GET {http address} {save as} - download files on the compromised system
- HELP - show Help Info (set of commands accepted)
- IRC {command} - send message to IRC Server
- SH {command} - execute command on the compromised system
SOLUTION
9.300
9.952.01
31 May 2013
9.953.00
31 May 2013
Scan your computer with your Trend Micro product to delete files detected as ELF_MANUST.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.