This script will run all the steps that are required to disable malicious Red Star OS components like "virus scanning" and watermarking of media files. This makes it easier for everyone to further research the system.
Tools for Red Star OS (붉은별)
This repository includes several binaries from and tools for Red Star OS. These can be used for further research work.
Disable malicious components
-
Get root privileges via
/usr/sbin/rootsetting
-
Disable SELinux
SELinux protects several files an directories (e.g. /var/log). It should be disabled in order to make changes to some parts of the system.
setenforce 0
In order to keep SELinux disabled after rebooting, append
selinux=0
to the kernel line in the GRUB config file (/boot/grub/grub.conf). -
Kill
securityd
Killing
securityd
will prevent the system from rebooting when editing/deleting various protected files.killall -9 securityd
-
Disable
rtscan
kernel moduleEither via
resctl.py
(seertscan
) or via a Python shell as follows:[root@localhost ~]# python Python 2.6 (r26:66714, Oct 7 2012, 13:39:47) [GCC 4.4.0 20090506 (Red Hat 4.4.0-4)] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> import fcntl >>> fcntl.ioctl(open('/dev/res', 'wb'), 29187) 0
After disabling
rtscan
protected processes likeopprc
will become killable. -
Kill
scnprc
andopprc
killall scnprc killall opprc
-
Replace
/usr/lib/libos.so.0.0.0
See
libos
for further information. Replacing this file will prevent the system from rebooting viasecurityd
after rebooting the system. It also will prevent reboot loops bykdm
rendering the system unusable. -
Delete
/usr/share/autostart/scnprc.desktop
Deleting this file will prevent
kdeinit
from starting the framework after a system reboot. -
Reboot the system
Disclaimer
All of the information is based on research dedicated to analyzing Red Star OS. The authors take no responsibility for the accuracy, completeness or quality of the information provided.