The-binary/[mingetty] - Technical Advisory
06 May 2002 (date of the binary's capture on a honeypot - probably released before this date)
Linux binary compatible systems (Linux, FreeBSD, OpenBSD, ...)
None (if system isn't compromised)
High (if system was previously compromised)
Remote backdoor - DDoS node
This executable, once uploaded and installed on a compromised host, permits the intruder to fully control it, and to use it as a starting point for DDoS attacks. It exchanges information with a specific client (currently not available) by communicating data in the payload of IP packets with a protocol field set to 11. The client source IP address is not easy to locate, because the tool offers integrated possibilities to spoof source and destination addresses, possibly by using decoys. Once started, the binary forks two child processes, as a classical Unix daemon, and simply wait for incoming packets from the network.
To detect the backdoor on a network, simply start the client in scanning mode: ./client <class C> .
On the host where the backdoor resides, the ps command will reveal a
process named [mingetty]. A simple kill command will terminate
The binary was probably started through a startup script: to easily find it on the filesystem, search for binary files with a size of 205.108 bytes, and containing the following strings: "[mingetty]" - "nazgul" - "TfOjG".
Never directly suspect a computer exchanging IP protocol 11 packets with the compromised host to be the intruder, because the tool permits to use decoys addresses.
The binary is a backdoor: it can't appear on a system if this one is secure.
Notice that the backdoor requires to be root to start. The best practice is
thus to have patched/updated systems, and to only give root passwords to qualified/honest
To avoid network traffic to compromised hosts, simply block at the perimeter firewall all IP packets with an IP protocol field set to 11 (10th byte of the IP header).
If the firewall permits it, you can also improve the filter by blocking packets with the first byte of the IP payload (the 21th byte of the IP packet) containing the value 02 or 03.