North Korean APT Kimsuky Deploys New Gomir Linux Backdoor in Targeted Attacks
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
The Gomir Backdoor
Gomir shares many similarities with GoBear, featuring direct command and control (C2) communication, persistence mechanisms, and support for executing a wide range of commands. Upon installation, the malware checks the group ID value to determine if it runs with root privileges on the Linux machine, and then copies itself to /var/log/syslogd for persistence.
Next, it creates a systemd service named ‘syslogd’ and issues commands to start the service before deleting the original executable and terminating the initial process. The backdoor also attempts to configure a crontab command to run on system reboot by creating a helper file (‘cron.txt’) in the current working directory. If the crontab list is updated successfully, the helper file is removed as well.
Functionality and Commands
Gomir supports 17 operations, triggered when the corresponding command is received from the C2 via HTTP POST requests:
- Pause communication with the C&C server.
- Execute arbitrary shell commands.
- Report the current working directory.
- Change the working directory.
- Probe network endpoints.
- Terminate its own process.
- Report the executable pathname.
- Collect statistics about directory trees.
- Report system configuration details (hostname, username, CPU, RAM, network interfaces).
- Configure a fallback shell for executing commands.
- Configure a codepage for interpreting shell command output.
- Pause communication until a specified datetime.
- Respond with “Not implemented on Linux!”
- Start a reverse proxy for remote connections.
- Report control endpoints for the reverse proxy.
- Create arbitrary files on the system.
- Exfiltrate files from the system.
According to Symantec researchers, the commands above “are almost identical to those supported by the GoBear Windows backdoor.”
Trending: Offensive Security Tool: 403jump
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: bleepingcomputer.com