PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

Share:

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection.

Elastic Security Lab researchers discovered a new loadable kernel module (LKM) rootkit called PUMAKIT that supports advanced evasion mechanisms.

PUMAKIT features a multi-stage design including a dropper, memory-resident executables, and a rootkit. It leverages an LKM rootkit named “PUMA,” using ftrace hooks to modify core system functions.

The malware hooks 18 syscalls and several kernel functions using ftrace() to hide files, directories, and the rootkit itself, while evading debugging attempts.

Developers focused on stealthy deployment, the malware activates only under specific conditions, such as secure boot checks or kernel symbol availability, embedding ELF binaries within its dropper.

“PUMAKIT is a sophisticated piece of malware, initially uncovered during routine threat hunting on VirusTotal and named after developer-embedded strings found within its binary.” reads the report published by Elastic Security Lab. “Key functionalities of the kernel module include privilege escalation, hiding files and directories, concealing itself from system tools, anti-debugging measures, and establishing communication with command-and-control (C2) servers.”

PUMAKIT
PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms 2

 

The LKM rootkit uses the syscall table to manipulate system behavior and relies on kallsyms_lookup_name() for symbol resolution. Unlike rootkits that target kernel versions 5.7 and above, the rootkit component of PUMAKIT does not use kprobes, suggesting it is designed for older kernels.

“This choice is significant because, prior to kernel version 5.7, kallsyms_lookup_name() was exported and could be easily leveraged by modules, even those without proper licensing.” continues the report.

“In February 2020, kernel developers debated the unexporting of kallsyms_lookup_name() to prevent misuse by unauthorized or malicious modules. A common tactic involved adding a fake MODULE_LICENSE("GPL") declaration to circumvent licensing checks, allowing these modules to access non-exported kernel functions. The LKM rootkit demonstrates this behavior”

The rmdir_hook() function in PUMAKIT’s kernel module intercepts rmdir() syscalls to manipulate directory operations. The malware uses it for privilege escalation and to retrieve configuration details based on a structured input pattern. The hook processes commands and arguments embedded in the syscall, starting with “zarya,” followed by command and argument characters. This structured system enhances control and concealment.

Below is the list of commands processed by the hook:

Command Purpose
zarya.c.0 Retrieve the config
zarya.t.0 Test the working
zarya.k.<pid> Hide a PID
zarya.v.0 Get the running version

Elastic Security developed a YARA signature to detect PUMAKIT components, including the dropper (cron), rootkit loader (/memfd:wpn), LKM rootkit, and Kitsune shared object files.

“PUMAKIT is a complex and stealthy threat that uses advanced techniques like syscall hooking, memory-resident execution, and unique privilege escalation methods. Its multi-architectural design highlights the growing sophistication of malware targeting Linux systems,” concludes the report.

Pierluigi Paganini

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
12:50 am, Mar 27, 2025
weather icon 7°C
L: 6° | H: 8°
few clouds
Humidity: 84 %
Pressure: 1024 mb
Wind: 5 mph SSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 19%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:46 am
Sunset: 6:24 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
6° | 8°°C 0 mm 0% 9 mph 90 % 1024 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
7° | 12°°C 1 mm 100% 13 mph 93 % 1015 mb 0 mm/h
Sat Mar 29 9:00 pm
weather icon
4° | 12°°C 0 mm 0% 9 mph 78 % 1023 mb 0 mm/h
Sun Mar 30 9:00 pm
weather icon
7° | 17°°C 0 mm 0% 10 mph 82 % 1024 mb 0 mm/h
Mon Mar 31 9:00 pm
weather icon
8° | 15°°C 0 mm 0% 8 mph 86 % 1028 mb 0 mm/h
Today 3:00 am
weather icon
8° | 9°°C 0 mm 0% 4 mph 87 % 1024 mb 0 mm/h
Today 6:00 am
weather icon
8° | 8°°C 0 mm 0% 4 mph 90 % 1023 mb 0 mm/h
Today 9:00 am
weather icon
11° | 11°°C 0 mm 0% 6 mph 69 % 1023 mb 0 mm/h
Today 12:00 pm
weather icon
16° | 16°°C 0 mm 0% 7 mph 51 % 1021 mb 0 mm/h
Today 3:00 pm
weather icon
17° | 17°°C 0 mm 0% 9 mph 47 % 1018 mb 0 mm/h
Today 6:00 pm
weather icon
15° | 15°°C 0 mm 0% 7 mph 60 % 1017 mb 0 mm/h
Today 9:00 pm
weather icon
12° | 12°°C 0 mm 0% 6 mph 78 % 1017 mb 0 mm/h
Tomorrow 12:00 am
weather icon
10° | 10°°C 0 mm 0% 7 mph 82 % 1015 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€81,141.96
-0.77%
Ethereum(ETH)
€1,876.50
-2.93%
Tether(USDT)
€0.93
-0.01%
XRP(XRP)
€2.21
-3.85%
Solana(SOL)
€128.30
-4.51%
USDC(USDC)
€0.93
0.00%
Dogecoin(DOGE)
€0.182540
1.16%
Shiba Inu(SHIB)
€0.000013
2.20%
Pepe(PEPE)
€0.000008
6.16%
Peanut the Squirrel(PNUT)
€0.214428
7.85%
Scroll to Top