Security News > 2022 > January > ‘Fully Undetected’ SysJoker Backdoor Malware Targets Windows, Linux & macOS

‘Fully Undetected’ SysJoker Backdoor Malware Targets Windows, Linux & macOS
2022-01-11 15:00

Dubbed SysJoker by Intezer, the backdoor is used for establishing initial access on a target machine.

A possible attack vector for SysJoker is an infected npm package, according to Intezer's analysis - an increasingly popular vector for dropping malware on targets.

To establish a connection with the C2, SysJoker first decodes a hardcoded Google Drive link using a hardcoded XOR key, researchers observed.

SysJoker can receive various commands, including "Exe," "Cmd," "Remove reg" and "Exit" - only two of which were enabled at the time of Intezer's analysis.

"SysJoker will receive a URL to a.ZIP file, a directory for the path the file should be dropped to and a filename that the malware should use on the extracted executable," according to Intezer.

Kill the processes related to SysJoker, delete the relevant persistence mechanism and all files related to SysJoker.


News URL

https://threatpost.com/undetected-sysjoker-backdoor-malwarewindows-linux-macos/177532/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Linux 11 64 2337 1502 67 3970