Rootkit Umbreon / Umreon - X86, ARM Samples

Posted on 7:53 PM by Tina



Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems
Research: Trend Micro


There are two packages
one is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package)






Download

Download Email me if you need the password  



File information

Part one (full package)

#File NameHash ValueFile Size (on Disk)Duplicate?
1.umbreon-ascii0B880E0F447CD5B6A8D295EFE40AFA376085 bytes (5.94 KiB)
2autoroot1C5FAEEC3D8C50FAC589CD0ADD0765C7281 bytes (281 bytes)
3CHANGELOGA1502129706BA19667F128B44D19DC3C11 bytes (11 bytes)
4cli.shC846143BDA087783B3DC6C244C2707DC5682 bytes (5.55 KiB)
5hideportsD41D8CD98F00B204E9800998ECF8427E0 bytes ( bytes)Yes, of file promptlog
6install.sh9DE30162E7A8F0279E19C2C30280FFF85634 bytes (5.5 KiB)
7Makefile0F5B1E70ADC867DD3A22CA62644007E5797 bytes (797 bytes)
8portchecker006D162A0D0AA294C85214963A3D3145113 bytes (113 bytes)
9promptlogD41D8CD98F00B204E9800998ECF8427E0 bytes ( bytes)
10readlink.c42FC7D7E2F9147AB3C18B0C4316AD3D81357 bytes (1.33 KiB)
11ReadMe.txtB7172B364BF5FB8B5C30FF528F6C51252244 bytes (2.19 KiB)
12setup694FFF4D2623CA7BB8270F5124493F37332 bytes (332 bytes)
13spytty.sh0AB776FA8A0FBED2EF26C9933C32E97C1011 bytes (1011 bytes)Yes, of file spytty.sh
14umbreon.c91706EF9717176DBB59A0F77FE95241C1007 bytes (1007 bytes)
15access.c7C0A86A27B322E63C3C29121788998B8713 bytes (713 bytes)
16audit.cA2B2812C80C93C9375BFB0D7BFCEFD5B1434 bytes (1.4 KiB)
17chown.cFF9B679C7AB3F57CFBBB852A13A350B22870 bytes (2.8 KiB)
18config.h980DEE60956A916AFC9D2997043D4887967 bytes (967 bytes)
19config.h.dist980DEE60956A916AFC9D2997043D4887967 bytes (967 bytes)Yes, of file config.h
20dirs.c46B20CC7DA2BDB9ECE65E36A4F987ABC3639 bytes (3.55 KiB)
21dlsym.c796DA079CC7E4BD7F6293136604DC07B4088 bytes (3.99 KiB)
22exec.c1935ED453FB83A0A538224AFAAC71B214033 bytes (3.94 KiB)
23getpath.h588603EF387EB617668B00EAFDAEA393183 bytes (183 bytes)
24getprocname.hF5781A9E267ED849FD4D2F5F3DFB8077805 bytes (805 bytes)
25includes.hF4797AE4B2D5B3B252E0456020F58E59629 bytes (629 bytes)
26kill.cC4BD132FC2FFBC84EA5103ABE6DC023D555 bytes (555 bytes)
27links.c898D73E1AC14DE657316F084AADA58A02274 bytes (2.22 KiB)
28local-door.c76FC3E9E2758BAF48E1E9B442DB98BF8501 bytes (501 bytes)
29lpcap.hEA6822B23FE02041BE506ED1A182E5CB1690 bytes (1.65 KiB)
30maps.c9BCD90BEA8D9F9F6270CF2017F9974E21100 bytes (1.07 KiB)
31misc.h1F9FCC5D84633931CDD77B32DB1D50D02728 bytes (2.66 KiB)
32netstat.c00CF3F7E7EA92E7A954282021DD72DC41113 bytes (1.09 KiB)
33open.cF7EE88A523AD2477FF8EC17C9DCD7C028594 bytes (8.39 KiB)
34pam.c7A947FDC0264947B2D293E1F4D69684A2010 bytes (1.96 KiB)
35pam_private.h2C60F925842CEB42FFD639E7C763C7B012480 bytes (12.19 KiB)
36pam_vprompt.c017FB0F736A0BC65431A25E1A9D393FE3826 bytes (3.74 KiB)
37passwd.cA0D183BBE86D05E3782B5B24E2C964132364 bytes (2.31 KiB)
38pcap.cFF911CA192B111BD0D9368AFACA03C461295 bytes (1.26 KiB)
39procstat.c7B14E97649CD767C256D4CD6E4F8D452398 bytes (398 bytes)
40procstatus.c72ED74C03F4FAB0C1B801687BE200F063303 bytes (3.23 KiB)
41readwrite.cC068ED372DEAF8E87D0133EAC0A274A82710 bytes (2.65 KiB)
42rename.cC36BE9C01FEADE2EF4D5EA03BD2B3C05535 bytes (535 bytes)
43setgid.c5C023259F2C244193BDA394E2C0B8313667 bytes (667 bytes)
44sha256.h003D805D919B4EC621B800C6C239BAE0545 bytes (545 bytes)
45socket.c348AEF06AFA259BFC4E943715DB5A00B579 bytes (579 bytes)
46stat.cE510EE1F78BD349E02F47A7EB001B0E37627 bytes (7.45 KiB)
47syslog.c7CD3273E09A6C08451DD598A0F18B5701497 bytes (1.46 KiB)
48umbreon.hF76CAC6D564DEACFC6319FA167375BA54316 bytes (4.21 KiB)
49unhide-funcs.c1A9F62B04319DA84EF71A1B091434C644729 bytes (4.62 KiB)
50cryptpass.py2EA92D6EC59D85474ED7A91C8518E7EC192 bytes (192 bytes)
51environment.sh70F467FE218E128258D7356B7CE328F11086 bytes (1.06 KiB)
52espeon-connect.shA574C885C450FCA048E79AD6937FED2E247 bytes (247 bytes)
53espeon-shell9EEF7E7E3C1BEE2F8591A088244BE0CB2167 bytes (2.12 KiB)
54espeon.c499FF5CF81C2624B0C3B0B7E9C6D980D14899 bytes (14.55 KiB)
55listen.sh69DA525AEA227BE9E4B8D59ACFF4D717209 bytes (209 bytes)
56spytty.sh0AB776FA8A0FBED2EF26C9933C32E97C1011 bytes (1011 bytes)
57ssh-hidden.shAE54F343FE974302F0D31776B72D0987127 bytes (127 bytes)
58unfuck.c457B6E90C7FA42A7C46D464FBF1D68E2384 bytes (384 bytes)
59unhide-self.pyB982597CEB7274617F286CA80864F499986 bytes (986 bytes)
60listen.shF5BD197F34E3D0BD8EA28B182CCE7270233 bytes (233 bytes)

part 2 (those listed in the Trend Micro article)
#File NameHash ValueFile Size (on Disk)
1015a84eb1d18beb310e7aeeceab8b84776078935c45924b3a10aa884a93e28acA47E38464754289C0F4A55ED7BB556489375 bytes (9.16 KiB)
20751cf716ea9bc18e78eb2a82cc9ea0cac73d70a7a74c91740c95312c8a9d53aF9BA2429EAE5471ACDE820102C5B81597512 bytes (7.34 KiB)
30a4d5ffb1407d409a55f1aed5c5286d4f31fe17bc99eabff64aa1498c5482a5f0AB776FA8A0FBED2EF26C9933C32E97C1011 bytes (1011 bytes)
40ce8c09bb6ce433fb8b388c369d7491953cf9bb5426a7bee752150118616d8ffB982597CEB7274617F286CA80864F499986 bytes (986 bytes)
5122417853c1eb1868e429cacc499ef75cfc018b87da87b1f61bff53e9b8e86709EEF7E7E3C1BEE2F8591A088244BE0CB2167 bytes (2.12 KiB)
6409c90ecd56e9abcb9f290063ec7783ecbe125c321af3f8ba5dcbde6e15ac64aB4746BB5E697F23A5842ABCAED36C9146149 bytes (6 KiB)
74fc4b5dab105e03f03ba3ec301bab9e2d37f17a431dee7f2e5a8dfadcca4c234D0D97899131C29B3EC9AE89A6D49A23E65160 bytes (63.63 KiB)
88752d16e32a611763eee97da6528734751153ac1699c4693c84b6e9e4fb08784E7E82D29DFB1FC484ED277C70218781855564 bytes (54.26 KiB)
9991179b6ba7d4aeabdf463118e4a2984276401368f4ab842ad8a5b8b730885222B1863ACDC0068ED5D50590CF792DF057664 bytes (7.48 KiB)
10a378b85f8f41de164832d27ebf7006370c1fb8eda23bb09a3586ed29b5dbdddfA977F68C59040E40A822C384D1CEDEB6176 bytes (176 bytes)
11aa24deb830a2b1aa694e580c5efb24f979d6c5d861b56354a6acb1ad0cf9809bDF320ED7EE6CCF9F979AEFE451877FFC26 bytes (26 bytes)
12acfb014304b6f2cff00c668a9a2a3a9cbb6f24db6d074a8914dd69b43afa452584D552B5D22E40BDA23E6587B1BC532D6852 bytes (6.69 KiB)
13c80d19f6f3372f4cc6e75ae1af54e8727b54b51aaf2794fedd3a1aa463140480087DD79515D37F7ADA78FF5793A42B7B11184 bytes (10.92 KiB)
14e9bce46584acbf59a779d1565687964991d7033d63c06bddabcfc4375c5f1853BBEB18C0C3E038747C78FCAB3E0444E371940 bytes (70.25 KiB)

More articles


  1. Hack Tools Mac
  2. How To Make Hacking Tools
  3. Hacker Tools Apk Download
  4. Hacking Tools For Pc
  5. Hacking Tools For Games
  6. Hacker Tools Github
  7. Pentest Tools For Ubuntu
  8. Hacking Tools For Pc
  9. Hacking Tools Github
  10. Hackers Toolbox
  11. Physical Pentest Tools
  12. Hacking Tools Github
  13. Hack Tools For Mac
  14. Hacker Tools Windows
  15. Hacking Tools Name
  16. Free Pentest Tools For Windows
  17. Pentest Tools Nmap
  18. How To Hack
  19. Hacking Tools For Mac
  20. Hack Tools
  21. Hacking Tools Kit
  22. Hack Tools Online
  23. Nsa Hack Tools Download
  24. Best Pentesting Tools 2018
  25. Hacking Tools Usb
  26. Hacking Tools Software
  27. Pentest Reporting Tools
  28. Easy Hack Tools
  29. Pentest Tools Port Scanner
  30. Hack Tools 2019
  31. Hacker Tools 2019
  32. Pentest Automation Tools
  33. Hack Tools Online
  34. Pentest Tools Review
  35. Pentest Tools Nmap
  36. Pentest Tools Port Scanner
  37. Pentest Tools Bluekeep
  38. Hacking Tools For Mac
  39. Hacking Tools For Games
  40. Hack Tools
  41. Hak5 Tools
  42. Hacker Tools Apk
  43. Hacker Tools Software
  44. Hacking Tools For Games
  45. Hack Tools Github
  46. Pentest Tools Nmap
  47. Blackhat Hacker Tools
  48. Hacker Tools 2020
  49. Pentest Tools Apk
  50. Android Hack Tools Github
  51. Hacker Tool Kit
  52. Beginner Hacker Tools
  53. Hacking Tools For Windows
  54. Black Hat Hacker Tools
  55. Hack Tools For Mac
  56. Hacker Tools Github
  57. Bluetooth Hacking Tools Kali
  58. Hacking Tools And Software
  59. Hacker Tools Online
  60. Hacker Tools Apk
  61. Hacker Tools For Pc
  62. Hacker Techniques Tools And Incident Handling
  63. Hacker Tools Mac
  64. Hacker Tools Online
  65. Hacker Tools For Ios
  66. Hacking Tools And Software
  67. Pentest Reporting Tools
  68. Hacking Tools For Beginners
  69. Pentest Recon Tools
  70. Computer Hacker
  71. Pentest Tools Url Fuzzer
  72. Hackrf Tools
  73. Hacker Tool Kit
  74. How To Hack
  75. Hacker
  76. Hacker Tools Github
  77. Hacker Tools Apk
  78. Hacker Tools Windows
  79. Hack Tools
  80. Hacker Tools Software
  81. Hack Tools Download
  82. Pentest Tools Port Scanner
  83. Hacking Tools For Windows 7
  84. Hack Tools Pc
  85. New Hacker Tools
  86. Pentest Tools Github
  87. Hacking Tools Mac
  88. Pentest Tools For Ubuntu
  89. Hacker Tools Github
  90. Pentest Tools Tcp Port Scanner
  91. Pentest Box Tools Download
  92. Hack Tools Mac
  93. Pentest Tools Nmap
  94. Hacker Tools For Ios
  95. Underground Hacker Sites
  96. Hack Tools
  97. Pentest Tools For Android
  98. Pentest Tools
  99. Hacker Tools List
  100. Hacker Tools Apk Download
  101. How To Make Hacking Tools
  102. Hacking Tools For Kali Linux
  103. Hack Tools 2019
  104. Hacking Tools For Windows
  105. Top Pentest Tools
  106. Hacker Search Tools
  107. Hacking Tools Download
  108. Tools 4 Hack
  109. Hacking Tools For Beginners
  110. Hack Tools Download
  111. Pentest Tools List
  112. Hack Tools For Windows
  113. Hack Tools
  114. Hack And Tools
  115. World No 1 Hacker Software
  116. Hack Tools For Mac
  117. Growth Hacker Tools
  118. Pentest Tools Github
  119. Pentest Tools Kali Linux
  120. Hacker Tools Mac
  121. Hacker Tools Apk Download
  122. Nsa Hack Tools
  123. Github Hacking Tools
  124. Hacking Tools Windows 10
  125. Pentest Tools Bluekeep
  126. Computer Hacker
  127. Tools Used For Hacking
  128. Hacking Tools
  129. Hacking Tools For Mac
  130. Hacking Tools Windows

Facebook Plans To Launch Its Own Cryptocurrency

Facebook Plans To Launch Its Own Cryptocurrency

Facebook Plans To Launch Its Own Cryptocurrency

The social network giant, Facebook is going through a bad phase with lots of ups and down. The recent scandal with Cambridge Analytica has caused the world's largest social network giant Facebook to change its stance on user privacy and to be more transparent about its use of the data it collects.
Since then, some social networks based in Blockchain have been popularized, namely Sphere, Steemit, and Howdoo. However, recently, something unusual announcement is announced by the social network giant Facebook itself, in which Facebook stated that it is investing in a Blockchain-based solution development team, but, the purpose of the project is not yet known.
It was with a post on the Facebook page that David Marcus confirmed his departure from the Messenger team and the creation of a small group dedicated to finding solutions based on the potential of Blockchain technology for Facebook.
David Marcus has not given much detail on the work he will do with his new group, saying only that they will study Blockchain from scratch so that they can use this revolutionary technology for Facebook.
"I'm setting up a small group to explore how to leverage Blockchain across Facebook, starting from scratch," stated David Marcus.
Despite being connected to Facebook's Messenger since 2014, David Marcus is no novice in these financial issues related to money transfers. In addition to having introduced the possibility of P2P payments in Messenger itself, David Marcus was President of PayPal and CEO of Zong, a company dedicated to payments on mobile devices.
However, his experience in this segment does not allow us to conclude that Facebook will create or support a crypto coin, but, it also doesn't mean that it will launch or support any crypto coin of its own. Blockchain technology has become famous thanks to crypto-coins, especially Bitcoin, but its potential expands dramatically to other areas.
The potential of Blockchain goes from the crypto-coins to the creation of real ecosystems online, supported by the users of the network. Sharing and storing data is a legacy that Blockchain allows you to explore and maybe the fact that Facebook will use it in your favor.
The lead post in Messenger was then handed over to Stan Chudnovsky, who now heads one of the most widely used communication services around the world, alongside WhatsApp.
Rumors also point out that James Everingham and Kevin Weil, both from Instagram, will also join David Marcus in this new onslaught of Facebook to one of today's most acclaimed technologies.

Continue reading


  1. Hacker Techniques Tools And Incident Handling
  2. Hacker Tools Free
  3. Pentest Tools Windows
  4. Hack Tools For Games
  5. Hacker Tools 2019
  6. Hacker Hardware Tools
  7. Tools 4 Hack
  8. Pentest Tools List
  9. Hacker Hardware Tools
  10. Free Pentest Tools For Windows
  11. Hack Tools Pc
  12. Hack Tools Github
  13. Hacker Tools For Pc
  14. Pentest Tools Download
  15. Hacking Tools Kit
  16. Pentest Tools Framework
  17. Android Hack Tools Github
  18. Hack And Tools
  19. Tools For Hacker
  20. Hack Tools Mac
  21. Hacking Tools Pc
  22. Best Pentesting Tools 2018
  23. Hacker Tools Online
  24. Hacker Security Tools
  25. Hacking Tools Online
  26. Hacking Tools And Software
  27. Hacker Tools Free
  28. Hackers Toolbox
  29. Pentest Tools For Mac
  30. Best Hacking Tools 2019
  31. Wifi Hacker Tools For Windows
  32. Pentest Tools For Android
  33. Hack Tools For Windows
  34. Best Hacking Tools 2019
  35. Hacker Tools Apk
  36. New Hack Tools
  37. Ethical Hacker Tools
  38. Pentest Tools Linux
  39. Hacking Tools Windows
  40. Hacker Tools Online
  41. Pentest Tools Bluekeep
  42. Tools For Hacker
  43. New Hacker Tools
  44. How To Install Pentest Tools In Ubuntu
  45. Hack Apps
  46. Hack App
  47. Hacking Tools
  48. Hacker Tools For Pc
  49. Pentest Tools
  50. Hacking App
  51. Hacking Tools Download
  52. Usb Pentest Tools
  53. Hacker Tool Kit
  54. Hacking Tools Pc
  55. Hacker Search Tools
  56. What Is Hacking Tools
  57. Hak5 Tools
  58. Hack Tools
  59. Hack Tools
  60. Hacking Tools And Software
  61. Pentest Tools Kali Linux
  62. Hack Rom Tools
  63. Hacker Techniques Tools And Incident Handling
  64. Hackers Toolbox
  65. Pentest Tools List
  66. Pentest Box Tools Download
  67. Hackers Toolbox
  68. Hacks And Tools
  69. Pentest Automation Tools


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


More info
  1. Bluetooth Hacking Tools Kali
  2. Hacking Tools For Windows Free Download
  3. Computer Hacker
  4. Pentest Tools Linux
  5. Hack Tools For Pc
  6. Hacking Tools Github
  7. Android Hack Tools Github
  8. Hacking Tools Github
  9. New Hack Tools
  10. Pentest Tools Apk
  11. Easy Hack Tools
  12. Hacker Tools Github
  13. Hacker Search Tools
  14. Pentest Tools Windows
  15. Pentest Tools Website Vulnerability
  16. Hacking Tools Name
  17. Hack App
  18. Growth Hacker Tools
  19. Hacking Tools Hardware
  20. Hak5 Tools
  21. Hacker Tool Kit
  22. What Is Hacking Tools
  23. Pentest Tools Alternative
  24. Nsa Hacker Tools
  25. Easy Hack Tools
  26. Pentest Tools Windows
  27. Pentest Tools Windows
  28. Pentest Tools Port Scanner
  29. Hacker Hardware Tools
  30. Hacking Apps
  31. Hack Tools Online
  32. Game Hacking
  33. Pentest Recon Tools
  34. Hack Apps
  35. Hacker Tools 2020
  36. Pentest Tools Alternative
  37. Hacker
  38. Hack Tool Apk
  39. Pentest Reporting Tools
  40. Pentest Tools Nmap
  41. Underground Hacker Sites
  42. Hacker Tools For Mac
  43. Hack Apps
  44. Hacking Tools Pc
  45. Kik Hack Tools
  46. Hacker Tools Online
  47. Hacking Tools Hardware
  48. Pentest Tools For Ubuntu
  49. Pentest Recon Tools
  50. New Hack Tools
  51. New Hack Tools
  52. Hack Tools 2019
  53. Hack Tools For Windows
  54. Hacking Tools And Software
  55. Pentest Tools Github
  56. Hacking Tools Kit
  57. Termux Hacking Tools 2019
  58. Nsa Hack Tools
  59. Hacker Tools Free
  60. Hacking Tools 2019
  61. Underground Hacker Sites
  62. Hacking Tools Online
  63. Pentest Tools
  64. Hacker Tools 2019
  65. What Are Hacking Tools
  66. Pentest Tools Kali Linux
  67. Hacker Tools Software
  68. Hacking Tools And Software
  69. World No 1 Hacker Software
  70. Hacker Tools Software
  71. Hacker Tools 2019
  72. Hacking Tools For Games
  73. Hacker Search Tools
  74. Usb Pentest Tools
  75. Underground Hacker Sites
  76. Pentest Tools Nmap
  77. Hack Tool Apk No Root
  78. Nsa Hack Tools Download
  79. Hack Tools For Pc
  80. Hack Rom Tools
  81. New Hacker Tools
  82. Tools Used For Hacking
  83. Hacking Tools Name
  84. Pentest Tools Linux
  85. Hacking Tools
  86. How To Hack
  87. Android Hack Tools Github
  88. Hack Tools For Ubuntu
  89. What Is Hacking Tools
  90. Hacking Tools For Kali Linux
  91. Hacking Tools For Games
  92. Pentest Tools Online
  93. Hacking Tools For Beginners
  94. Pentest Tools Open Source
  95. Hacker Tool Kit
  96. Hacking Tools For Games
  97. Hacker Tools Mac
  98. How To Install Pentest Tools In Ubuntu
  99. Pentest Tools Download
  100. Hack Website Online Tool
  101. Hacker Tools Hardware
  102. Termux Hacking Tools 2019
  103. Hack Tools Online
  104. Hacker Tools For Windows