Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Gafgyt
Backdoor:Linux/Gafgyt.AW!xp is a specific variant of the Gafgyt botnet malware targeting Linux systems. Once executed, it grants an attacker remote control over the compromised machine, incorporating it into a botnet. The primary purpose of this botnet is to launch large-scale Distributed Denial-of-Service (DDoS) attacks.
No specific strings found for this threat
rule Backdoor_Linux_Gafgyt_AW_2147815944_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Gafgyt.AW!xp"
threat_id = "2147815944"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Gafgyt"
severity = "Critical"
info = "xp: an internal category used to refer to some threats"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "3"
strings_accuracy = "High"
strings:
$x_2_1 = "/bin/busybox chmod 777" ascii //weight: 2
$x_1_2 = "npxXoudifFeEgGaACScs" ascii //weight: 1
$x_1_3 = "hlLjztqZ" ascii //weight: 1
$x_1_4 = "32mStarting Scanner" ascii //weight: 1
condition:
(filesize < 20MB) and
(
((3 of ($x_1_*))) or
((1 of ($x_2_*) and 1 of ($x_1_*))) or
(all of ($x*))
)
}6ef5fc0df3fb0c7765ddc808a63fba888286409804221c2f2e68860dafc52e4fdf2ac9adc5964c1af0a970fa475b8dd20b8b3ec3e6ccb773a2914ee468722f94aeec94d8ff6fae6d4b942c3d4cba2a962e25ae42948c6188fc488bb2de638d24d2b83cd52fe2b24e675b5291a15052c043b2a4b7e65dc3ba27206bb60b20d6116088f6f27b1647c2dccd8861e112e484e82a91a86868376981635fded155dfe4Isolate the affected system from the network immediately to prevent communication with the command-and-control server. Remove the detected file and perform a full system scan. Investigate the initial access vector, change all system credentials, and secure any exposed services like SSH or Telnet with strong passwords.