Unpacking the Diicot Malware Targeting Linux Environments

A new malware campaign attributed to the Romanian-speaking Diicot threat group has been discovered targeting Linux systems. The campaign shows significant advancements compared to previous iterations, including modified UPX headers with corrupted checksums, advanced payload staging, and environment-specific behavior. The malware targets Linux machines running OpenSSH, exploiting weak credentials for access. It employs various techniques such as file obfuscation, reverse shell capabilities, persistence mechanisms, and command and control communication. The campaign also includes SSH brute force functionality and potential cryptojacking capabilities. The attackers have earned over $16,000 from Monero mining alone. Author: AlienVault

Related Tags:
T1110.001

T1053.003

T1027.002

brute-force

openssh

XMRig

UPX

persistence

linux

Associated Indicators:
8891E7562EB4DB253A8582376083CA99B19457680F9D36A5BA4108790740785E

7BCFCC90D0BD6C85B5B1CC9F287E161020571A0418AFB50F2DD67685E9D3A4FC

B351E3F475681AB2E8DB5B2BBD2BEAF26E5B4FD082CA08EBA6FFFBC76370113C

C43E506C9B964DDDF6FD784BF0CC78B4A2396F47257361DC22E1070E249EAE16

716778BAB5FB2C439A51362BE5941A50D587714D58A6FAA39EEFA96AA79C1561

BDA2503FC02B11258399CFABD0778A997654B5BD7D30E5E3F5BEF54A74B914E1

01082CD4733E5F3E2C3F642FA6C0AFB5A9489D39FF26A35549263FC0E02EBAD3

D23491DD351F43F0EFAD5CEE2BE80C4049349A7695C0E7DE1DE632C791356183

4DCE8B3BEBA71B8B44B6576FF2497ED68C6FAFEBD046822F0D60F8758238E900