Trojan for Linux takes screenshots
January 19, 2016
Once launched, Linux.Ekoms.1 checks whether one of subfolders in the home directory contains files with specified names. If it fails to find any, it randomly chooses a subfolder to save its own copy there. Then, the Trojan is launched from new location. If successful, the malicious program establishes connection to the server whose addresses are hard-coded in its body. All information transmitted between the server and Linux.Ekoms.1 is encrypted.
Every 30 seconds the Trojan takes a screenshot and saves it to a temporal folder in the JPEG format. If the file is not saved, the Trojan tries to save it in the BMP format. The temporary folder is downloaded to the server in specified intervals.
One of system threads created by the Trojan generates a filtering list for the "aa*.aat", "dd*ddt", "kk*kkt", "ss*sst” files that are searched in the temporary location and uploads the files that match these criteria to the server. If the answer is the uninstall line, Linux.Ekoms.1 downloads the executable file from the server, saves it to the temporary folder and runs it. Moreover, the Trojan can download and save a number of other files.
Along with the ability of screenshot taking, the Trojan’s code contains a special feature to record sound and save it as the .aat file in the WAV format. However, in fact, this feature is not used anywhere. The entry for Linux.Ekoms.1 was added to the Dr.Web virus databases. Therefore, this malicious program poses no threat to our users.
Your opinion counts
Sign in or register to comment on our news posts and take advantage of other benefits available to registered users. You will be awarded one Dr.Webling per comment. You can exchange your Dr.Weblings for gift certificates that can be used to purchase Dr.Web at a discount.