Winnti Linux is an updated variant of the Winnti backdoor, created by the advanced persistent threat group of the same name. First observed in 2015, it is believed to be shared among a small group of trusted threat actors for use in their own disparate campaigns.
At the time of publication, Winnti Linux has only been observed being delivered through spear-phishing campaigns
Winnti Linux’s primary module, called libxselinux, is a lightly modified version of the open-source Azazel rootlet. Once installed, it will decrypt an embedded port configuration file before connecting to a command and control server using a variety of protocols (HTTP, ICMP, and custom TCP/UDP) and modifying commonly used functions to disguise its operations.
Analysis of the Linux variant revealed that it contains two files: the main backdoor Trojan (libxselinux) and a library (libxselinux.so) used to hide the malware.
By default Winnti Linux is able to exfiltrate folders and files, execute arbitrary code, escalate privileges, and perform lateral network movements. Some variants are able to create a SOCKS5 proxy on affected systems, although it is unclear if this is a core capability or added functionality.
Linux malware is quite rare among nation-state hacking groups, when writing malware they tend to focus on Windows operating systems.
Indicators of Compromise
MD5 File Hashes
SHA256 File Hashes
UK based technology professional, with an interest in computer security and telecoms.