A new, fully undetected Linux backdoor implant, containing rarely seen functionalities with regards to Linux malware, targeting desktop users. The evidence shows operational similarities between this implant and Gamaredon Group.
Gamaredon Group is an alleged Russian threat group. It has been active since at least 2013, and has targeted individuals likely involved with the Ukrainian government. Gamaredon Group infects victims using malicious attachments, delivered via spear phishing techniques. The group’s implants are characterized by the employment of information stealing tools—among them being screenshot and document stealers delivered via a SFX, and made to achieve persistence through a scheduled task.
The operators of EvilGnome use a hosting provider that has been used by Gamaredon Group for years, and continues to be used by the group.
Deployment with Makeself SFX
This implant is delivered in the form of a self-extracting archive shell script created with makeself:
“makeself.sh is a small shell script that generates a self-extractable compressed tar archive from a directory. The resulting file appears as a shell script (many of those have a .run suffix), and can be launched as is. The archive will then uncompress itself to a temporary directory and an optional arbitrary command will be executed (for example an installation script). This is pretty similar to archives generated with WinZip Self-Extractor in the Windows world.”
As can be observed in the illustration above, the makeself script is instructed to run ./setup.sh after unpacking.
Using makeself’s options, we are able to instruct the script to unpack itself without executing:
The archive contains four files:
Indicators of Compromise
Malware Hash (MD5/SHA1/SH256)
It is recommended for the users to check “~/.cache/gnome-software/gnome-shell-extensions” directory for the “gnome-shell-ext” executable.