Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Linux.Packed.238
Aggiunto al database dei virus Dr.Web:
2018-12-09
La descrizione è stata aggiunta:
2018-12-09
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Launches processes:
sh -c /var/tmp/vrxwme vrxw &
/var/tmp/vrxwme vrxw
sh -c /var/tmp/dclyre &
/var/tmp/dclyre
sh -c /var/tmp/pnvfye pnvf &
/var/tmp/pnvfye pnvf
sh -c /var/tmp/myxmpv dbln &
/var/tmp/myxmpv dbln
sh -c /var/tmp/wfbuqv wfbu &
/var/tmp/wfbuqv wfbu
Kills the following processes:
/var/tmp/vrxwme
/var/tmp/dclyre
Unknown process with PID: 722
Unknown process with PID: 724
Unknown process with PID: 729
Performs operations with the file system:
Modifies file access rights:
/var/tmp/vrxwme
/var/tmp/dclyre
/var/tmp/pnvfye
/var/tmp/myxmpv
/var/tmp/wfbuqv
Creates or modifies files:
/var/tmp/vrxwme
/var/tmp/ps
/var/tmp/dclyre
/var/tmp/.tmp
/var/tmp/pnvfye
/var/tmp/myxmpv
/var/tmp/wfbuqv
Deletes files:
/var/tmp/vrxwme
/var/tmp/dclyre
/var/tmp/pnvfye
/var/tmp/myxmpv
/var/tmp/wfbuqv
Locks files:
/var/tmp/ps
/var/tmp/.tmp
Network activity:
Establishes connection:
HTTP GET requests:
18#.###.169.6/jm/jrd
18#.###.169.6/jm/lmmml
18#.###.169.6/jm/jpp
HTTP POST requests:
Receives data from the following servers:
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK