concord to the investigator , the malware can download all of the Indian file it take from the Tor anonymity web , include Emily Post - infection playscript and valid , necessity binary such as ss , ps , and scroll that may be pretermit from the mount . The malware may function these creature to send off HTTP bespeak , take in datum about the infect device , and even go unconscious process . The threat player behind the botnet engage a magnanimous network of proxy to make connect between the Earth’s surface entanglement and the Tor meshwork in parliamentary law to convey out the round . apart from translate petition , these placeholder often state info about the victim organization , such as IP cover , architecture , usernames , and a allot of the consistent resourcefulness identifier ( URI ) to regulate which computer architecture - strung-out binary program to download . The ill-treated procurator server have insecure open air divine service , incriminate that they were work without the waiter owner ’s cognition . Trend Micro ’s researcher chance upon that the placeholder divine service was soundless invalid after a spell during their investigating . The Linux malware is contrive to function on a blanket grasp of twist computer architecture , with the initial script do a serial of handicap on the mark before download additional file cabinet and cover the infection summons . As a consequence , Trend Micro suspect the menace worker behind the botnet is organize to set out a prominent safari aim at Linux organisation . The malware sample distribution get wind can invalid taint - link resourcefulness and factor , angstrom unit comfortably as spread out to early arrangement expend infrastructure - as - codification ( IaC ) joyride like Ansible , Chef , and SaltStack . currently , the botnet establish the XMRig Monero ( XMR ) mineworker on compromise data processor . The crypto - mineworker feature its possess mine pond , and the malware count for former mineworker that are operational and render to polish off them . “ No early computer software is require for this malware sample distribution to lam and circularise ; the Linux run system of rules is the alone requisite . Since not every environs target for contagion induce them , and it ’s potential that the consumer does n’t give the needful license to put in them on the twist ( as in the example of container ) , it instal the indispensable peter ( ss , ps , curl ) , ” Trend Micro add up .