HackTool.Linux.ExploitScan.AB
HEUR:Exploit.Linux.CVE-2014-3120.a (KASPERSKY); a variant of Linux/HackTool.ExploitScan.A application (NOD32)
Linux
Threat Type: Hacking Tool
Destructiveness: No
Encrypted: Yes
In the wild: Yes
OVERVIEW
This Hacking Tool may be dropped by other malware.
TECHNICAL DETAILS
Arrival Details
This Hacking Tool may be dropped by the following malware:
Download Routine
This Hacking Tool downloads the file from the following URL and renames the file when stored in the affected system:
- http:/{BLOCKED}.{BLOCKED}.218.107/b2f627/ip_cn.txt (Contains List of IP Addresses)
It saves the files it downloads using the following names:
- {Malware Directory}\dkecl
Other Details
This Hacking Tool does the following:
- It scans either randomly-generated or specific IP addresses over the Internet to try and exploit vulnerable devices.
- It tries to login to MSSQL Server and scan its data.
- It scans and takes advantage of the following vulnerabilities to remotely execute commands on exploited devices:
- It scans the following specific ports to try and exploit the vulnerable devices:
- 80
- 1433
- 6379
- 6380
- 7001
- 7002
- 8080
- 8088
- 9200
It deletes the following files to remove its traces in the system:
- {Malware Directory}\dkecl
SOLUTION
Scan your computer with your Trend Micro product to delete files detected as HackTool.Linux.ExploitScan.AB. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.