I have encountered libprocesshider
being used in the wild. This is a userland rootkit that abuses LD_PRELOAD to hide processes.
https://github.com/gianlucaborello/libprocesshider
This library is simple; under 100 lines of C code. This rule matched on a malicious libprocesshider library found on a honeypot system.
rule libprocesshider
{
meta:
description = "libprocesshider userland rootkit"
strings:
$ = "%d (%[^)]s"
$ = "/proc/self/fd/%d"
$ = "/proc/%s/stat"
$ = "dlsym"
condition:
all of them
}
Pingback: Week 07 – 2022 – This Week In 4n6