分析者: Raymart Christian Yambot   

 :

Trojan.Linux.XZBackdoor (IKARUS)

 平台:

Linux

 总体风险等级:
 潜在破坏:
 潜在分布:
 感染次数:
 信息暴露:

  • 恶意软件类型:
    Trojan

  • 有破坏性?:
    没有

  • 加密?:
    是的

  • In the Wild:
    是的

  概要

感染途徑: 从互联网下载、由其他恶意软件释放

该木马通过两种途径进入系统:一是被其他恶意软件作为文件释放到系统中,二是用户访问恶意网站时在不知情的情况下下载的文件。

它会利用特定漏洞。

  技术详细信息

文件大小: 1,773,076 bytes
报告日期: Other
内存驻留: 是的
初始樣本接收日期: 2025年1月22日
Payload: 释放文件, Modifies files

Arrival Details

该木马通过两种途径进入系统:一是被其他恶意软件作为文件释放到系统中,二是用户访问恶意网站时在不知情的情况下下载的文件。

Installation

该木马程序会释放以下文件:

  • {Installation Directory}/.libs/liblzma_la-crc64-fast.o → Legitimate copy of {Installation Directory}/.libs/liblzma_la-crc64_fast.o
  • {Installation Directory}/.libs/liblzma_la-crc32-fast.o → Legitimate copy of {Installation Directory}/.libs/liblzma_la-crc32_fast.o
  • {Installation Directory}/liblzma_la-crc64-fast.o
  • {Installation Directory}/liblzma.so.5.6.0

其他系统修改

This Trojan modifies the following file(s):

  • {Installation Directory}/.libs/liblzma_la-crc64_fast.c
  • {Installation Directory}/.libs/liblzma_la-crc32_fast.c
  • {Installation Directory}/src/liblzma/check/crc64_fast.c
  • {Installation Directory}/src/liblzma/check/crc32_fast.c

其他信息

该木马程序会执行以下操作:

  • It will proceed with its malicious routine if the following conditions are met:
    • Checks if GNU indirect function support is enabled.
    • Requires shared library support.
    • Checks if the system is an x86-64 Linux environment.
    • Checks for CRC IFUNC (Indirect Function) codes.
    • Checks if GCC (GNU Compiler Collection) and GNU ld (GNU Linker) are installed on the system.
    • Checks for the presence of good-large_compressed.lzma and bad-3-corrupt_lzma2.xz.
    • Checks if liblzma/Makefile contains all of the following lines within its content:
      • am__uninstall_files_from_dir =
      • __get_cpuid(
      • am__install_max =
      • am__vpath_adj_setup =
      • am__include = include
      • all: all-recursive
    • LTLIBRARIES = \$(lib_LTLIBRARIES)
    • AM_V_CCLD = \$(am__v_CCLD_\$(V))
    • am__install_max =
    • Checks if libtool is configured to build position-independent code (PIC).
    • Checks if the environment is Debian-based or RPM-based (x86_64).
    • It checks if the hijacked functions and hidden payloads are properly injected in the following files:
      • {Installation Directory}/src/liblzma/check/crc64_fast.c
      • {Installation Directory}/src/liblzma/check/crc32_fast.c
      • {Installation Directory}/src/liblzma/check/crc_x86_clmul.h
    • Checks if libtool is configured to build with IFUNC-compatible flags.
    • Checks if lazy symbol resolution (-z lazy) is NOT enabled.
    • Checks if the malicious object file liblzma_la-crc64-fast.o exists.
  • Upon successful completion of the build process, the backdoor functionality will be compiled and linked into the following file:
    • {Installation Directory}/liblzma.so.5.6.0
  • It waits for an OpenSSH connection and indirectly loads the liblzma.so.5.6.0 file, which contains the malicious code.
  • It renames the following files to their original names if the build fails:
    • {Installation Directory}/liblzma_la-crc32-fast.o → .libs/liblzma_la-crc32_fast.o
    • {Installation Directory}/liblzma_la-crc64-fast.o → .libs/liblzma_la-crc64_fast.o

它会利用以下漏洞:

It deletes the following files to remove its traces in the system:

  • {Installation Directory}/.libs/liblzma.a
  • {Installation Directory}/.libs/liblzma.la
  • {Installation Directory}/.libs/liblzma.lai
  • {Installation Directory}/.libs/liblzma.so
  • {Installation Directory}/.libs/liblzma_la-crc64-fast.o
  • {Installation Directory}/.libs/liblzma_la-crc32-fast.o
  • {Installation Directory}/liblzma_la-crc64-fast.o

  解决方案

最小扫描引擎: 9.800
First VSAPI Pattern File: 19.850.04
VSAPI 第一样式发布日期: 2025年1月20日
VSAPI OPR样式版本: 19.851.00
VSAPI OPR样式发布日期: 2025年1月21日

使用您的亚信安全产品扫描电脑,删除被检测为以下名称的文件 Trojan.Linux.XZBACKDOOR.A. 若亚信安全产品已将检测到的文件清除、删除或隔离,则无需再执行任何额外步骤;您也可选择直接删除隔离区中的文件。更多信息请访问以下亚信安全支持页面: