Analysis of the T0rn Rootkit

by Toby Miller
Sept. 19, 2017 0 comments Symantec

The purpose of this paper is to inform the IDS community of signatures related to the t0rn rootkit. This paper will not serve as a how-to guide to the t0rn rootkit; rather, it is designed to identify binaries and ports that t0rn uses. This paper will also provide md5sums of binaries and analysis on how to detect t0rn.

https://www.symantec.com/connect/articles/analysis-t0rn-rootkit