Backdoored configuration script waits until user is inactive (!) to run Linux malware
Backdoored configuration script waits until user is inactive (!) to run Linux malware
VMRay Labs has found a backdoored build configuration script for httpd designed to drop and run the XMRig malware to mine Monero.
Surprisingly, the script waits until the user has been inactive for at least a minute before starting the crypto-miner.
It also looks out for resource monitoring tools such as htop, nmon, or iostat, in which case it kills the resource-heavy XMRig process to avoid being caught. To maintain access, the sample adds the attackers’ public key to the “.ssh/authorized_keys” file, allowing them to re-enter into the compromised machine without a password.
Note, the official httpd configuration script from Apache is NOT backdoored – this is about a custom modification by threat actors, likely to distribute their own backdoored httpd source code to their victims.
0 / 62 detections on VirusTotal
In a nutshell:
- backdoored “configure” script → Shell script → Daemon → XMRig
- Watches for these processes and kills the miner if present: top, htop, atop, mate-system-mon, iostat, mpstat, sar, glances, dstat, nmon, vmstat, ps
- Collects information about the hardware (cpuinfo, meminfo, os-release, machine-id, etc.) and about files in the home directory every 12h
- Uploads information to file.io with an expiry date of ten days.
- Shows fake error message about a missing “libnetauth” which does not seem to be a real library
- Installs its own SSH auth key
Our analysis report shows our executable compound sample submission that executes the first two shell script payloads
Dive deeper into the report
Sample SHA256:
901d7698b77d4a7cd1a7db3ea61bf866dcee77e677761f9d1ba6d193837e5447
See why we think this is malicious in plain language.
See the whole path of the sample’s execution
Map the malicious activities on the MITRE ATT&CK Framework
Explore detailed information on the IP addresses, URLs and DNS, including function logs and PCAP Streams
Download the IOCs and artifacts to have a clear picture of the threat.
Download the files that the malware downloads, drops or modifies.
Explore how you can use these insights
目录
最新
- How Northwestern Mutual accelerated threat investigation with VMRay
- February 2025 Detection Highlights: A Record Month of New YARA Rules
- Malware & Phishing Threat Landscape Report – 2024/2
- What is SEO Poisoning? A Growing Threat to Cybersecurity
- DLL Sideloading: What It Is and How to Detect It
- Actionable Threat Intelligence in Cybersecurity: A Comprehensive Guide
- Release Highlights: VMRay Platform 2025.1.0
- January 2025 Detection Highlights: Entrypoint Injection, Hotlinking, and a Robust New Set of Smart Link Detonation Rules