Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Gafgyt
Backdoor:Linux/Gafgyt.AZ!xp is a variant of the Gafgyt malware family that targets Linux-based systems, often IoT devices. The malware incorporates the compromised device into a botnet to participate in Distributed Denial-of-Service (DDoS) attacks. It also contains functionality to find and terminate other processes, likely to remove competing malware or security tools.
No specific strings found for this threat
rule Backdoor_Linux_Gafgyt_AZ_2147817555_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Gafgyt.AZ!xp"
threat_id = "2147817555"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Gafgyt"
severity = "Critical"
info = "xp: an internal category used to refer to some threats"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "3"
strings_accuracy = "High"
strings:
$x_1_1 = "wkUxzvutsrqp_nm-ihgfFCcba" ascii //weight: 1
$x_1_2 = "sending kill request" ascii //weight: 1
$x_1_3 = "[killer] finding and killing processes holding port" ascii //weight: 1
$x_1_4 = "[attack] starting attack" ascii //weight: 1
$x_1_5 = "/proc/cpuinfo" ascii //weight: 1
$x_1_6 = "npxXoudifFeEgGaACScs" ascii //weight: 1
condition:
(filesize < 20MB) and
(3 of ($x*))
}38b4560f692a917a8da916e8fa7ed141fe38703b3d6f3a614f7b5d2d37c09eda964cbc8388c9b95046f986b8618878198adff6932f1e8918f797c105bcca49df5af18de9965ec5b65164155b5e9af924eb43935bbb002c1e581aa8e9551aaa0f798bf0bba7a22707557a27f5fcd7f1717cd12fe4bda53510ed459cfe71cca3376ccb561e2f7e50232add60823f8392547f6313715adf1778616b90e36d6012e71. Isolate the affected Linux device from the network. 2. Identify and remove the malicious file and its persistence mechanisms (e.g., cron jobs, startup scripts). 3. Re-image the device from a known-good backup and change all credentials. 4. Investigate and patch the initial point of compromise, such as weak passwords or unpatched services.