LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Security (https://www.linuxquestions.org/questions/linux-security-4/)
-   -   If you infected by any of these recent ELF malware cases please contact us? (https://www.linuxquestions.org/questions/linux-security-4/if-you-infected-by-any-of-these-recent-elf-malware-cases-please-contact-us-4175546925/)

JAYCEE1 12-24-2017 03:54 PM

How can we scan our system to see if we are infected?

ondoho 12-25-2017 02:55 AM

Quote:

Originally Posted by mostafashaban (Post 5794132)
thnkss

what a glorious first post. :sarcasm:
textspeak or typo, no punctuation, and necrobumping.
well, welcome to LQ anyhow. i appreciate the fact that you are actually saying thank you.

Quote:

Originally Posted by JAYCEE1 (Post 5797377)
How can we scan our system to see if we are infected?

please start a dedicated thread with a detailed problem description.

Pearlseattle 01-11-2018 06:17 PM

Quote:

Originally Posted by ondoho (Post 5797489)
please start a dedicated thread with a detailed problem description.

In my opinion this is not useful, as this is a sticky thread (therefore attracting a lot of attention) => infos about when to ignore the issue or how to detect it if relevant in some context should be added.
Just leaving it like this generates only uncertainty.

ruhirai 02-14-2018 06:00 AM

very useful information shared!!

malwaremustdie 04-21-2019 04:18 AM

A lot of incidents caused by ELF packed malware infection from actor: SystemTen (aka "rocke") for mining
 
The threat mentioned in the subject, is hitting a lot of VPS on intel x64 systems right now, I received many reports too, so it is necessary to write much details to help IR and Admins dealing with these incidents. I wrote report for incident handling purpose in bwlow Imgur, for they contain many artifacts that can be useful for your incident case, many pictures you can use as reference for handling this infection.

The report URL: https://imgur.com/a/H7YuWuj

Sample of incident: https://community.atlassian.com/t5/C.../qaq-p/1054605

The adversary is calling themselves as "SystemTen" (systemten[.]org) originated from China (PRC) mainland region. Previously they allegedly use name of "rocke" (I wasn't on that cases so you just have to rely on some internet reports about previous incidents).

"SystemTen" is using below infrastructure as their C2 and miner:

PHP Code:

systemten[.]org:8080
systemten
[.]org:51640 

Their previous attack has been detected coming from below IP addresses:

PHP Code:

134.209.104.20  AS14061 134.209.96.0/20 DIGITALOCEAN-ASN US DigitalOceanLLCUS
185.193.125.146 
AS37560 185.193.125.0/24 CYBERDYNE, | LR LR
104.31.92.233   
AS13335 104.31.80.0/20 CLOUDFLARENET US CloudflareInc., US 

Their servers is registered in the below name servers:

PHP Code:

systemten.org.  NS  1-you.njalla.no.
systemten.org.  NS  2-can.njalla.in.
systemten.org.  NS  3-get.njalla.fo.

systemten.org.  NS  gail.ns.cloudflare.com.
systemten.org.  NS  karl.ns.cloudflare.com

Their downloader is served under these two domain name on also CloudFlare:

PHP Code:

ooxx.ooo 104.18.38.218 104.18.39.218 AS13335 104.18.32.0/20 CLOUDFLARENET US CloudflareInc., US
z9ls
.com 104.31.81.164 104.31.80.164 |  AS13335 104.31.80.0/20 CLOUDFLARENET US CloudflareInc., US 


Above data is important for the mitigation of the threat. Thank you - malwaremustdie.org

malwaremustdie 04-21-2019 07:02 AM

After the last posts I made in blog.malwaremustdie.org, and kernelmode.info, I started own moderated repository for the Linux malware specific research for helping infected people.

The new repository is in here. I made the youtube video for all people can choose ways you can view the repository, in here.

LinuxQuestions.org friends are welcome to view.

malwaremustdie 04-22-2019 10:06 PM

About the SystemTen for org threat that infects Linux VPS, below is the latest infrastructure they use for you to block.
Please see the previous thread for the details:

Code:

i.ooxx.ooo.            300    IN      A      45.63.0.102
1.z9ls.com.            600    IN      CNAME  1.z9ls.com.cdn.dnsv1.com.
1.z9ls.com.cdn.dnsv1.com. 600  IN      CNAME  1824153.sp.tencdns.net.
1824153.sp.tencdns.net. 180    IN      A      211.91.160.238
systemten.org.          900    IN      A      104.248.53.213
z9ls.com.              600    IN      A      103.52.216.35

i.ooxx.ooo  | 45.63.0.102    | AS20473 | 45.63.0.0/20 | vultr.com/Choopa, LLC, US
1.z9ls.com  | 211.91.160.238 | AS4837 | 211.91.160.0/20 | CHINA169 UNICOM China169 Backbone, CN
systemten.org| 104.248.53.213 | AS14061 | 104.248.48.0/20 | DigitalOcean,  LLC, US
z9ls.com    | 103.52.216.35  | AS132203,  CN Tencent Bldg, Kejizhongyi Av)

malwaremustdie.org ^ about us: https://en.wikipedia.org/wiki/MalwareMustDie


All times are GMT -5. The time now is 05:54 PM.