A Trojan, designed for Linux systems operating on the ARM processors, that carries out DDoS attacks.
The Trojan has an embedded command handler that allows to execute instructions received from the command and control server. The malware program can attack specified servers by using the TCP/IP (TCP-Flood) and HTTP (HTTP-Flood) protocols.