ELF_DDOS.A
HEUR:Trojan-DDoS.Linux.Agent.a (Kaspersky), Linux.Xorddos (Symantec), ELF:Xorddos-K (Avast)
Linux
Threat Type: Backdoor
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This Backdoor may be downloaded from remote sites by other malware.
TECHNICAL DETAILS
Varies
ELF
Yes
09 Jan 2015
Arrival Details
This Backdoor may be downloaded from remote site(s) by the following malware:
- UNIX_XORDDOS.A
NOTES:
It installs a copy of itself in the following directory:
- /boot/{10 random characters}
It has a component configuration files that contain the following categories (list):
- md5 - checksum of file
- denyip - open communication with an IP
- filename - list of filename
- rmfile - files to remove
The malware terminates, denies, or removes processes that are listed on the said configuration file.
It is capable of the following commands:
- Decrypt config file
- Manipulate files and directories
- Add/Delete Service
- Manipulate processes and services
- Execute files
- Execute commands
- Calculate Crc (Header/FindIp/File)
- Upload/Download files
- Update compoments
- Get machine Info
- Remote connections
- Deny Remote Connections
- DoS SYN,UDP and TCP flood
- Kill processes listed in config
It also capable of the following rootkit functionalities:
- Check IP
- Check Port
- Check Process
- Firewall Accept IP
- Firewall Drop IP
- Hide/Unhide files
- Hide/Unhide process
- Hide/Unhide TCP4 port
- Hide/Unhide TCP6 port
- Hide/Unhide UDP4 port
- Hide/Unhide UDP6 port
- Patch/Unpatch VFS
- Patch/Unpatch UDP
- Patch/Unpatch TCP
- Hook Function
It connects to the following C&C server:
- {BLOCKED}3.{BLOCKED}5.9.228
SOLUTION
9.700
Step 1
Remove the malware/grayware file dropped/downloaded by ELF_DDOS.A. (Note: Please skip this step if the threat(s) listed below have already been removed.)
- UNIX_XORDDOS.A
Step 2
Scan your computer with your Trend Micro product to delete files detected as ELF_DDOS.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.