SHA1:
- b56178f89fb04790c6069efcfefc22560edce237 (ARM)
- 780304f61e00e08d102a77bea2fc0404abac5e0e (x86)
- e1cff2ae566a13a425dee9b5c6f5275ecb763e53 (M68K)
- 4ced6e3d57d531944f82f1ab1a41a21bfae1ee1f (MIPS)
- e214a71947bc57e3ab00524cdeda4c2ff24dad84 (MIPSEL)
- 9cb64b74e951dd65fc4943cc81179e79c6e18ab2 (PPC)
- d76e2c462b618acc1b67e457de6d14d16fc0fe11 (SH4)
- 8738cc20b6a3ef42466acace285fbca24a59edc8 (SPARC)
Trojan capable of infecting Linux devices. There are versions for the following architectures: Intel x86, M68K, MIPS, MIPSEL, SPARC, SH4, Power PC, ARM. Designed to carry out DDoS attacks. It is spread by means of the SH script (042141c06a102861755dbc28afd48de5a63a8c24). After being launched, it waits for the Internet connection. In case of successful connection, it connects to its command and control server and sends it information about the infected device. The transferred data looks as follows:
"SYS/sn/$(uname -o)/nn/$(uname -n)/vr/$(uname -v)/me/$(uname -m)/build/1.377/"
Then the Trojan sends the PING request to the C&C server and waits for commands. It can execute the following commands:
Command | Description | Note |
---|---|---|
UD | Execute command and wait for its completion | |
SH | Execute command in background mode | |
PING | Send PING | |
EXIT | Terminate itself | |
HTTP | Launch DDoS attack on the indicated host | Assumes the name of the attacked host and the duration of the attack in seconds in the parameters |
The commands are sent to the Trojan without encryption, as a plain text, the parameters are separated. During operation, the malware uses the following list of DNS servers:
45.32.28.232
185.121.177.177
185.121.177.53
45.63.25.55
142.4.204.111
142.4.205.47
62.113.203.55
130.255.78.223
5.9.49.12
144.76.133.38
87.98.175.85
5.135.183.146
193.183.98.154
108.61.164.218
89.18.27.34
93.170.96.235
95.154.246.132
96.90.175.167
45.56.117.118
138.197.25.214
69.164.196.21
23.94.60.240
50.116.23.211
45.32.230.22