Summary of "Linux Process Running with Hidden Binary Name Attack"

Main ideas / lessons

Methodology / step-by-step investigation (as shown)

A) What Sandfly reported (conceptual findings)

B) Command-line verification and manual investigation (performed in the demo)

  1. List hidden files in /tmp

    • Go to the directory:
      • cd /tmp
    • Run:
      • ls -al
    • Explanation:
      • Without -al, dot-prefixed files may not appear.
      • With ls -al, hidden files and attributes become visible.
    • Observations from ls -al:
      • Visible hidden files include:
        • .X0-lock
        • .X0-1ock (notable subtle difference)
          • The subtitles note the difference is likely the character “1” instead of “L” to hide or confuse identification.
    • Size difference noted:
      • .X0-lock is described as 11 bytes
      • .X0-1ock is described as 67K bytes
  2. Identify the suspicious file type

    • Use:
      • file <filename>
    • Result described:
      • The larger variant is an ELF executable
      • Identified as ARM (appropriate for the Raspberry Pi)
  3. Hash the file for lookup

    • Use:
      • sha1sum <filename>
    • Purpose:
      • Potentially compare hashes against malware databases (noted as not super reliable).
  4. Inspect open files and network activity for the running PID

    • Use:
      • lsof -p 14721
    • Explanation:
      • Confirms:
        • Current working directory (expected /tmp)
        • Libraries loaded
        • Open resources
        • Listening network port (consistent with earlier findings)
  5. Alternative deeper manual inspection via /proc

    • Navigate to process info:
      • /proc/<PID> (example uses PID 14721)
    • Use ls -al inside:
      • /proc/14721
    • Check file descriptors via:
      • cd /proc/14721/fd
    • Then list open socket/file descriptors as part of deeper analysis.
    • For sockets, the subtitles suggest using:
      • netstat or the ip command.

Key conclusions emphasized

Speakers / sources featured

Category ?

Educational


Share this summary


Is the summary off?

If you think the summary is inaccurate, you can reprocess it with the latest model.

Video