Date: 01/14/2025
Severity: High
Summary
In this analysis, we examined the rootkit malware in detail. We first described how the kernel module establishes a Netfilter hook function on NF_INET_PRE_ROUTING to intercept incoming TCP traffic directed to the compromised system. We then detailed the tasks performed by the Netfilter hook function, including processing attacker-initiated packets and response packet formats, invoking the user-space file, and facilitating data exchange between the user-space process and the kernel module.
Indicators of Compromise (IOC) List
Hash : |
8D016D02F8FBE25DCE76481A90DD0B48630CE9E74E8C31BA007CF133E48B8526 6EDD7B3123DE985846A805931CA8EE5F6F7ED7B160144AA0E066967BC7C0423A
D57A2CAC394A778E19CE9B926F2E0A71936510798F30D20F207F2A49B49CE7B1 |
Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection
Hash : |
SHA256Hash IN ("8D016D02F8FBE25DCE76481A90DD0B48630CE9E74E8C31BA007CF133E48B8526","6EDD7B3123DE985846A805931CA8EE5F6F7ED7B160144AA0E066967BC7C0423A","D57A2CAC394A778E19CE9B926F2E0A71936510798F30D20F207F2A49B49CE7B1") |
Reference:
https://www.fortinet.com/blog/threat-research/deep-dive-into-a-linux-rootkit-malware