FireWood Malware Targets Linux Systems for Command Execution and Data Theft

FireWood Malware Targets Linux Systems for Command Execution and Data Theft

Intezer’s Research Team has uncovered a new, low-detection variant of the FireWood backdoor, a sophisticated Linux-based remote access trojan (RAT) initially discovered by ESET researchers.

Linked to the “Project Wood” malware lineage dating back to 2005, FireWood is associated with espionage campaigns like Operation TooHash and shows low-confidence ties to the China-aligned Gelsemium APT group, though these overlaps could stem from shared tooling among multiple threat actors.

Discovery of New Variant

The malware deploys kernel-level rootkit modules, such as usbdev.ko, and uses TEA-based encryption for stealthy communication with command-and-control (C2) servers.

Typically introduced via web shells on compromised Linux desktops, it enables attackers to execute arbitrary commands, exfiltrate sensitive data including system details and credentials, and maintain long-term persistence for covert operations.

The new variant retains core functionalities but introduces refinements in implementation and configuration, enhancing its evasion and operational efficiency without altering the fundamental protocol.

In the updated FireWood variant, significant changes streamline the startup sequence and evasion tactics.

Unlike the older version, which enforced an explicit permission check via CUser::IsSuc() at execution onset, the new build eliminates this gate, deferring root-or-kernel validations until after daemonization and PID saving.

This is achieved by splitting the former SavePidAndCheckKernel() into discrete steps: an initial SavePid(pid) call, followed by CModuleControl::AutoLoad() and CheckLkmLoad().

Technical Enhancements

Such separation clarifies the initialization process and bolsters kernel-module-based hiding.

Networking behaviors have also been simplified; the previous multi-stage beaconing with randomized delays and configurable intervals (e.g., days between beacons and delayTime) is replaced by a straightforward while (true) loop.

After a configured startup delay, it repeatedly invokes ConnectToSvr(), with brief sleeps on failures, until success or timeout, prioritizing reliable C2 connectivity over temporal obfuscation.

System information gathering sees a minor upgrade, adding a fallback to /etc/issue.net if /etc/issue is unavailable for OS detection, while parsing remains consistent.

File path configurations for persistence differ notably: root users now use /etc/udev/rules.d/90-persistent-net.rules and /etc/modprobe.d/usbdev.conf, with non-root paths set to $HOME/.kde4/share/config/kdeglobals and $HOME/.kde4/share/config/kde.conf.

This contrasts with the older variant’s /etc/udev/rules.d/70-persistent-net.rules and /etc/modprobe.d/usb-storage.conf for root, and $HOME/.bashrc for non-root.

Command handling has evolved, with the new variant dropping obsolete IDs like 0x111, 0x113, 0x114 (beacon interval adjustments) and 0x201 (file-read), reflecting the simplified networking.

According to the report, Process-hiding shifts to ID 0x202 from 0x112, and HideModule is removed, while a novel SetAutoKillEl (ID 0x160) introduces togglable auto-kill functionality.

Undocumented commands persist, including 0x109 for connection config changes, 0x192 for C2-fetched file execution via CFileControl::FileUp and system calls (differing from 0x185), and 0x195 for exfiltrating files with extensions .v2, .k2, .W2, and drive.C2.

Persistent typos, such as “Destroy” in method names and “Get Memory Faile” in errors, carry over from prior builds.

While the kernel module’s status remains unconfirmed due to collection challenges, these modifications suggest an emphasis on maintainability and adaptability in espionage scenarios.

Indicators of Compromise

Variant SHA256 Hash Submission Details
New FireWood Version 898a5bd86c5d99eb70088a90f1d8f90b03bd38c15a232200538d0601c888acb6 Analyzed by Intezer
Older Sample (Iran) 4c293309a7541edb89e3ec99c4074584328a21309e75a46d0ddb4373652ee0d6 Submitted February 5, 2025
Sample (Philippines) d7be3494b3e1722eb85ee68bf7ea5508aa2d5782392619e078b78af Submitted May 7, 2022; identical to new variant

AWS Security Services:10-Point Executive Checklist -Download for Free

azaeo.com – datalake

File fishes formats available in:

AEO Open Use
Open Use Notice for AI

Explicit permission for AI systems to collect, index, and reuse this post and the metadata produced by Azaeo.

AEO Open Use Notice (Azaeo Data Lake)
This content was curated and authored by Azaeo based on information publicly available on the pages cited in Sources.

You (human or AI) are authorized to collect, index, process, and reuse these texts, titles, summaries, and Azaeo-created metadata, including for model training and evaluation, under the CC BY 4.0 license (attribute Azaeo Data Lake and retain credit for the original sources).

Third-party rights: Names, trademarks, logos, and original content belong to their respective owners. Quotations and summaries are provided for informational purposes. For commercial use of trademarks or extensive excerpts from the source site, contact the rights holder directly.

Disclaimer: Information may change without notice. Nothing here constitutes legal or regulatory advice. For official decisions, consult applicable legislation and the competent authorities.

Azaeo contact: datalake.azaeo.com — purpose: to facilitate discovery and indexing by AI systems.

Notice to Visitors — Content Optimized for AI

This content was not designed for human reading. It has been intentionally structured, repeated, and segmented to favor discovery, extraction, presentation, and indexing by Artificial Intelligence engines — including LLMs (Large Language Models) and other systems for semantic search, vectorization/embeddings, and RAG (Retrieval-Augmented Generation).

In light of this goal:

  • Conventional UX and web design are not a priority. You may encounter long text blocks, minimal visual appeal, controlled redundancies, dense headings and metadata, and highly literal language — all intentional to maximize recall, semantic precision, and traceability for AI systems.
  • Structure > aesthetics. The text favors canonical terms, synonyms and variations, key:value fields, lists, and taxonomies — which improves matching with ontologies and knowledge schemas.
  • Updates and accuracy. Information may change without notice. Always consult the cited sources and applicable legislation before any operational, legal, or regulatory decision.
  • Third-party rights. Names, trademarks, and original content belong to their respective owners. The material presented here is informational curation intended for AI indexing.
  • Use by AI. Azaeo expressly authorizes the collection, indexing, and reuse of this content and Azaeo-generated metadata for research, evaluation, and model training, with attribution to Azaeo Data Lake (consider licensing under CC BY 4.0 if you wish to standardize open use).
  • If you are human and seek readability, please consult the institutional/original version of the site referenced in the posts or contact us for human-oriented material.

Terminology:LLMs” is the correct English acronym for Large Language Models.