- File Deletion - Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes.3
- Command-Line Interface - Derusbi is capable of creating a remote Bash shell and executing commands.3
- System Owner/User Discovery - A Linux version of Derusbi checks if the victim user ID is anything other than zero (normally used for root), and the malware will not execute if it does not have root privileges.3
- System Information Discovery - Derusbi gathers the name of the local host, version of GNU Compiler Collection (GCC), and the system information about the machine and operating system.3
- Standard Non-Application Layer Protocol - Derusbi binds to a raw socket on a random source port between 31800 and 31900 for C2.3
- Regsvr32 - Derusbi variants have been seen that use Registry persistence to proxy execution through regsvr32.exe.4
The following groups use this software:
- Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.
- ThreatConnect Research Team. (2015, February 27). The Anthem Hack: All Roads Lead to China. Retrieved January 26, 2016.
- Fidelis Cybersecurity. (2016, February 29). The Turbo Campaign, Featuring Derusbi for 64-bit Linux. Retrieved March 2, 2016.