Home / malware Linux.Chikdos.C
First posted on 23 June 2015.
Source: SymantecAliases :
There are no other names known for Linux.Chikdos.C.
Explanation :
The Trojan is usually manually installed or executed on the affected computer.
When the Trojan is executed, it loads the following as a configuration file: [PATH TO FILE]/fake.cfg
The Trojan connects to a predefined IP address using a predefined TCP port. The IP address and TCP port vary from sample to sample.
The Trojan may then perform the following actions:Send CPU and network information to a remote locationUse the compromised computer to conduct denial-of-service (DoS) attacksLast update 23 June 2015