ELF_TSUNAMI.R

Malware type: Backdoor
Destructive: No
Platform: Linux/UNIX
Encrypted: No
In the wild: Yes

 

This Linux backdoor has increased potential for damage, propagation, or both, that it possesses. Specifically, it is capable of carrying brute force attacks or exploit on the D-Link Internet router.

To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.

 

 

This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.

It connects to Internet Relay Chat (IRC) servers.

 

File size: Varies
File type: ELF
Memory resident: Yes
Initial samples received date: 09 Mar 2011

Arrival Details

This backdoor may be dropped by other malware.

It may be unknowingly downloaded by a user while visiting malicious websites.

Backdoor Routine

This backdoor connects to any of the following Internet Relay Chat (IRC) servers:

  • {BLOCKED}.{BLOCKED}.81.114
  • {BLOCKED}.{BLOCKED}.52.185
  • {BLOCKED}.{BLOCKED}.51.77
  • vexaa.{BLOCKED}th.cx

It joins any of the following IRC channel(s):

  • #dlink
  • #dlink_key
  • #kleber
  • #kaiten
  • #kromex

Download Routine

This backdoor downloads updated copies of itself from the following websites:

  • {BLOCKED}.{BLOCKED}.52.22

NOTES:

This backdoor is capable of receiving and executing the following commands from an IRC server:

  • .login {password} - this logs in the bot's to the party-line
  • .logout - this logs out the bot from the party-line
  • .exec {command} - this executes a system command
  • .clone {URL} {malware file name} - this clones hydra from new binary (HTTP)
  • .upgrade {URL} {malware file name} - this upgrades the binary from a specified HTTP URL
  • .version - this shows the current version of bot
  • .status - this shows the status of bot
  • .help - this shows a specific help message
  • .advscan {a} {b} {user} {password} - scanner/exploit with user:passwd values
  • .advscan {a} {b} - scanner/exploit with auto user:passwd values
  • .recursive - advscan with local addr (A.B-range)
  • .recrd - advscan with local addr (B-range random())
  • .stop - this stops scan/flood actions
  • .synflood {host} {port} {secs} - this is the standard command to perform a SYN flood
  • .ircflood {nick} {number} {type} - this is the standard command to perform an IRC flood (type: 0=PRIVMSG, 1=CTCP)
  • .join {channel} {password} - this connects the bot in selected channel using a specified password
  • .part {channel} - this removes the bot from a specified channel
  • .quit - this disconnects the bot from the server

Other variants have been noted to use the following commands:

  • TSUNAMI {target} {secs} - this triggers the bot to perform a denial of service (DoS) attack on a specific target by sending packets at n seconds interval
  • UNKNOWN {target} {secs} - this performs a non-spoof UDP flood to a specific target at n seconds interval
  • PAN {target} {port} {secs} - this performs an advanced SYN flood to a specific target at n seconds interval
  • UDP {target} {port} {secs} - this performs a UDP flood to a specific target at n seconds interval
  • GETSPOOFS - this prevents anyone from tracking the source of the DoS attack
  • SPOOFS {subnet} - changes spoofing to a subnet
  • GET {HTTP address} {save as} - this downloads and saves a file
  • IRC {command} - this sends commands to the IRC server
  • SH {command} - this executes commands

Based on this backdoor's code, it has the ability to check if an Internet router is using a standard password by using a brute force attack. It is found, however, that there is no list of user names and passwords that it uses for the attack. Furthermore, it can check if the router is vulnerable to the following vulnerability:

  • D-Link DSL Router Remote Authentication Bypass Vulnerability

More information about the said vulnerability can be seen from this Web page:

Solution

 

Minimum scan engine: 8.900
First VSAPI Pattern File: 7.890.01
First VSAPI Pattern Release Date: 09 Mar 2011
VSAPI OPR Pattern Version: 7.891.00
VSAPI OPR Pattern Release Date: 11 Mar 2011

Step 1

Scan your computer with your Trend Micro product to delete files detected as ELF_TSUNAMI.R If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值