Trojan.Linux.XZBACKDOOR.A
2025年3月20日
:
Trojan.Linux.XZBackdoor (IKARUS)
平台:
Linux
总体风险等级:
潜在破坏:
潜在分布:
感染次数:
信息暴露:


恶意软件类型:
Trojan
有破坏性?:
没有
加密?:
是的
In the Wild:
是的
概要
感染途徑: 从互联网下载、由其他恶意软件释放
该木马通过两种途径进入系统:一是被其他恶意软件作为文件释放到系统中,二是用户访问恶意网站时在不知情的情况下下载的文件。
它会利用特定漏洞。
技术详细信息
文件大小: 1,773,076 bytes
报告日期: Other
内存驻留: 是的
初始樣本接收日期: 2025年1月22日
Payload: 释放文件, Modifies files
Arrival Details
该木马通过两种途径进入系统:一是被其他恶意软件作为文件释放到系统中,二是用户访问恶意网站时在不知情的情况下下载的文件。
Installation
该木马程序会释放以下文件:
- {Installation Directory}/.libs/liblzma_la-crc64-fast.o → Legitimate copy of {Installation Directory}/.libs/liblzma_la-crc64_fast.o
- {Installation Directory}/.libs/liblzma_la-crc32-fast.o → Legitimate copy of {Installation Directory}/.libs/liblzma_la-crc32_fast.o
- {Installation Directory}/liblzma_la-crc64-fast.o
- {Installation Directory}/liblzma.so.5.6.0
其他系统修改
This Trojan modifies the following file(s):
- {Installation Directory}/.libs/liblzma_la-crc64_fast.c
- {Installation Directory}/.libs/liblzma_la-crc32_fast.c
- {Installation Directory}/src/liblzma/check/crc64_fast.c
- {Installation Directory}/src/liblzma/check/crc32_fast.c
其他信息
该木马程序会执行以下操作:
- It will proceed with its malicious routine if the following conditions are met:
- Checks if GNU indirect function support is enabled.
- Requires shared library support.
- Checks if the system is an x86-64 Linux environment.
- Checks for CRC IFUNC (Indirect Function) codes.
- Checks if GCC (GNU Compiler Collection) and GNU ld (GNU Linker) are installed on the system.
- Checks for the presence of good-large_compressed.lzma and bad-3-corrupt_lzma2.xz.
- Checks if liblzma/Makefile contains all of the following lines within its content:
- am__uninstall_files_from_dir =
- __get_cpuid(
- am__install_max =
- am__vpath_adj_setup =
- am__include = include
- all: all-recursive
- LTLIBRARIES = \$(lib_LTLIBRARIES)
- AM_V_CCLD = \$(am__v_CCLD_\$(V))
- am__install_max =
- Checks if libtool is configured to build position-independent code (PIC).
- Checks if the environment is Debian-based or RPM-based (x86_64).
- It checks if the hijacked functions and hidden payloads are properly injected in the following files:
- {Installation Directory}/src/liblzma/check/crc64_fast.c
- {Installation Directory}/src/liblzma/check/crc32_fast.c
- {Installation Directory}/src/liblzma/check/crc_x86_clmul.h
- Checks if libtool is configured to build with IFUNC-compatible flags.
- Checks if lazy symbol resolution (-z lazy) is NOT enabled.
- Checks if the malicious object file liblzma_la-crc64-fast.o exists.
- Upon successful completion of the build process, the backdoor functionality will be compiled and linked into the following file:
- {Installation Directory}/liblzma.so.5.6.0
- It waits for an OpenSSH connection and indirectly loads the liblzma.so.5.6.0 file, which contains the malicious code.
- It renames the following files to their original names if the build fails:
- {Installation Directory}/liblzma_la-crc32-fast.o → .libs/liblzma_la-crc32_fast.o
- {Installation Directory}/liblzma_la-crc64-fast.o → .libs/liblzma_la-crc64_fast.o
它会利用以下漏洞:
It deletes the following files to remove its traces in the system:
- {Installation Directory}/.libs/liblzma.a
- {Installation Directory}/.libs/liblzma.la
- {Installation Directory}/.libs/liblzma.lai
- {Installation Directory}/.libs/liblzma.so
- {Installation Directory}/.libs/liblzma_la-crc64-fast.o
- {Installation Directory}/.libs/liblzma_la-crc32-fast.o
- {Installation Directory}/liblzma_la-crc64-fast.o
解决方案
最小扫描引擎: 9.800
First VSAPI Pattern File: 19.850.04
VSAPI 第一样式发布日期: 2025年1月20日
VSAPI OPR样式版本: 19.851.00
VSAPI OPR样式发布日期: 2025年1月21日
使用您的亚信安全产品扫描电脑,删除被检测为以下名称的文件 Trojan.Linux.XZBACKDOOR.A. 若亚信安全产品已将检测到的文件清除、删除或隔离,则无需再执行任何额外步骤;您也可选择直接删除隔离区中的文件。更多信息请访问以下亚信安全支持页面:


