Home / malwarePDF  

Linux.Chikdos.C


First posted on 23 June 2015.
Source: Symantec

Aliases :

There are no other names known for Linux.Chikdos.C.

Explanation :

The Trojan is usually manually installed or executed on the affected computer.

When the Trojan is executed, it loads the following as a configuration file: [PATH TO FILE]/fake.cfg
The Trojan connects to a predefined IP address using a predefined TCP port. The IP address and TCP port vary from sample to sample.

The Trojan may then perform the following actions:Send CPU and network information to a remote locationUse the compromised computer to conduct denial-of-service (DoS) attacks

Last update 23 June 2015

 

TOP