Virus Profile: Linux/Gates

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 10/2/2014
Date Added: 6/17/2016
Origin: N/A
Length: Varies
Type: Trojan
Subtype: Linux
DAT Required: N/A
Removal Instructions


This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Indication of Infection

Presence of above mentioned activities

Methods of Infection

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email spam, etc.



Virus Characteristics

"Linux/Gates" is a part of the backdoor family named BillGates.        
"Linux/Gates" is a variation of this malware with a few functions disabled and a few other added.
"Linux/Gates" are a fully featured backdoor used mainly as a DDoS tool. It is capable of performing several types of DDoS based on the command sent to the bots from a Command & Control server (C&C). The typical DDoS methods include:

  • TCP Flood
  • UDP Flood
  • ICMP flood
  • HTTP attack
  • User-Agent flood
  • HTTP User authentication attack
  • DNS amplification flood

Linux/Gates also connects to a C&C to receive commands and is capable of accepting generic management commands like the ones below:

  •  Update current version
  •  Open backdoor shell
  •  Send CPanel command (used to communicate with CPanel interface probably running on same machine)
  •  Upload/download files
  •  Generic file management (create, delete, chane permissions)
  •  Open HTTP backdoor

This tool is usually installed manually by an attacker following a successful compromise of the machine which could be done through many methods. The most common methods of spreading are through SSH bruteforce attacks or vulnerabilities in Content Management Systems (CMS) like Wordpress, or exploiting weak passwords in CPanel management interfaces.
Once executed, the malware will perform different actions depending on the name it is run as, for example if the name is "sshd" and the file is located at the home folder of the current user:
 Create files named /tmp/monilod and /tmp/gateslod They contain the PID of the malware running processes.
 Try to connect to its C&C:

  • wwwvnc8com
  • 68863322org
  • 2323425122:6009

If it is running as any other name, it will install itself under the file /usr/bin/sshd .


All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).


PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!