linux-malware
linux-malware copied to clipboard
Tracking interesting Linux (and UNIX) malware. Send PRs
### Area Malware reports ### Parent threat _No response_ ### Finding https://analyze.intezer.com/files/82aa04f8576ea573a4772db09ee245cab8eac7ff1e7200f0cc960d8b6f516e92 ### Industry reference Log4J ### Malware reference [/malware/binaries/Unix.Trojan.Log4J/82aa04f8576ea573a4772db09ee245cab8eac7ff1e7200f0cc960d8b6f516e92.elf.x86](../blob/main/malware/binaries/Unix.Trojan.Log4J/82aa04f8576ea573a4772db09ee245cab8eac7ff1e7200f0cc960d8b6f516e92.elf.x86) ### Actor reference _No response_ ### Component Linux ### Scenario...
### Area Malware reports ### Parent threat _No response_ ### Finding https://www.intezer.com/blog/research/lightning-framework-new-linux-threat/ ### Industry reference _No response_ ### Malware reference Lightning [/malware/binaries/Lightning](../tree/main/malware/binaries/Lightning) ### Actor reference _No response_ ### Component Linux...
### Area Malware reports ### Parent threat Initial Access Lateral Movement Impact ### Finding https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery ### Industry reference _No response_ ### Malware reference RapperBot [/malware/binaries/RapperBot](../tree/main/malware/binaries/RapperBot) ### Actor reference _No response_...
### Area Offensive tools ### Parent threat Initial Access, Lateral Movement ### Finding https://github.com/metac0rtex/SSH-Private-Key-Brute-Forcer ### Industry reference _No response_ ### Malware reference _No response_ ### Actor reference _No response_ ###...
### Area Offensive tools ### Parent threat _No response_ ### Finding https://github.com/io-tl/Mara ### Industry reference _No response_ ### Malware reference _No response_ ### Actor reference _No response_ ### Component Linux...
### Area Defensive techniques ### Parent threat _No response_ ### Finding https://github.com/timb-machine/obscure-forensics ### Industry reference _No response_ ### Malware reference _No response_ ### Actor reference _No response_ ### Component _No...
### Area Defensive techniques ### Parent threat Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Lateral Movement, Exfiltration, Impact ### Finding https://github.com/rung/threat-matrix-cicd ### Industry reference _No response_ ###...
### Area Defensive techniques ### Parent threat _No response_ ### Finding https://github.com/archcloudlabs/BSidesRoc2022_Linux_Malware_Analysis_Course ### Industry reference _No response_ ### Malware reference _No response_ ### Actor reference _No response_ ### Component _No...
### Area Offensive techniques ### Parent threat Persistence ### Finding https://github.com/milabs/awesome-linux-rootkits ### Industry reference _No response_ ### Malware reference _No response_ ### Actor reference _No response_ ### Component Linux ###...
### Area Offensive tools ### Parent threat _No response_ ### Finding https://github.com/DavidBuchanan314/dlinject ### Industry reference _No response_ ### Malware reference _No response_ ### Actor reference _No response_ ### Component Linux...