A New Linux crypto-miner executes shell on Linux and exploits privilege escalation vulnerabilities to steal root password and disables antivirus.
PUBLISH DATE: 26-11-2018
It has been identified that a Linux crypto-miner has the ability to steal root passwords and disable the system’s antivirus.
The trojan first identifies and kills all rival cryptocurrency-mining malware families, and then downloads and starts its own Monero-mining operation. Trojan also installs a rootkit and another strain of malware that can execute DDoS attacks.
This new malware strain doesn’t have a distinctive name and is being tracked by its generic detection name of Linux.BtcMine.174.
But despite the generic name, the trojan is a little bit more complex than most Linux malware, mainly because of the plethora of malicious features it includes.
The trojan itself is a giant shell script of over 1,000 lines of code. This script is the first file executed on an infected Linux system. The first thing this script does is to find a folder on disk to which it has write permissions so it can copy itself and later use to download other modules.
Once the trojan has a foothold on the system it uses one of two privilege escalation exploits CVE-2016-5195 (also known as Dirty COW) and CVE-2013-2094 to get root permissions and have full access to the OS.
INDICATORS OF COMPROMISE
SHA1 file hashes for the trojan’s various components are available on GitHub.
Here’s further analysis of the Trojan in case system admins want to scan their systems.
Red Hat Virtualization 4.x Red Hat Enterprise Linux Desktop 7
Red Hat Enterprise Linux HPC Node 7
Red Hat Enterprise Linux Server 7
Red Hat Enterprise Linux Workstation 7
Red Hat Network provides the updated packages via the following links.
If you think you’re a victim of a cyber-attack, immediately send an email to firstname.lastname@example.org for a quick response.