マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Linux.Siggen.1530

Added to the Dr.Web virus database: 2019-03-23

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates or modifies the following files:
  • /etc/inittab
  • /var/spool/cron/crontabs/root
  • /etc/rc.local
Malicious functions:
Substitutes application name for:
  • mm06eju6aukf7ab6
Modifies router settings:
  • /bin/nvram
Launches processes:
  • sh -c cat /etc/inittab | grep -v \"<SAMPLE_FULL_PATH>\" > /etc/inittab2
  • sh -c crontab -l | grep <SAMPLE_FULL_PATH> || (crontab -l ; echo \"* * * * * <SAMPLE_FULL_PATH> > /dev/null 2>&1 &\") | crontab - > /dev/null 2>&1 &
  • cat /etc/inittab
  • grep -v <SAMPLE_FULL_PATH>
  • crontab -l
  • grep <SAMPLE_FULL_PATH>
  • sh -c echo \"0:2345:respawn:<SAMPLE_FULL_PATH>\" >> /etc/inittab2
  • crontab -
  • sh -c cat /etc/inittab2 > /etc/inittab
  • cat /etc/inittab2
  • sh -c rm -rf /etc/inittab2
  • rm -rf /etc/inittab2
  • sh -c touch -acmr /bin/ls /etc/inittab
  • touch -acmr /bin/ls /etc/inittab
  • sh -c cp -f <SAMPLE_FULL_PATH> /dev/shm/<SAMPLE>
  • sh -c /bin/uname -n
  • sh -c nvram get router_name
  • cp -f <SAMPLE_FULL_PATH> /dev/shm/<SAMPLE>
  • /bin/uname -n
  • sh -c cat /etc/inittab | grep -v \"/dev/shm/<SAMPLE>\" > /etc/inittab2
  • sh -c crontab -l | grep /dev/shm/<SAMPLE> || (crontab -l ; echo \"* * * * * /dev/shm/<SAMPLE> > /dev/null 2>&1 &\") | crontab - > /dev/null 2>&1 &
  • grep -v /dev/shm/<SAMPLE>
  • grep /dev/shm/<SAMPLE>
  • sh -c echo \"0:2345:respawn:/dev/shm/<SAMPLE>\" >> /etc/inittab2
  • sh -c cp -f <SAMPLE_FULL_PATH> /var/tmp/<SAMPLE>
  • cp -f <SAMPLE_FULL_PATH> /var/tmp/<SAMPLE>
  • sh -c cat /etc/inittab | grep -v \"/var/tmp/<SAMPLE>\" > /etc/inittab2
  • sh -c crontab -l | grep /var/tmp/<SAMPLE> || (crontab -l ; echo \"* * * * * /var/tmp/<SAMPLE> > /dev/null 2>&1 &\") | crontab - > /dev/null 2>&1 &
  • grep -v /var/tmp/<SAMPLE>
  • grep /var/tmp/<SAMPLE>
  • sh -c echo \"0:2345:respawn:/var/tmp/<SAMPLE>\" >> /etc/inittab2
  • sh -c cp -f <SAMPLE_FULL_PATH> /var/lock/<SAMPLE>
  • cp -f <SAMPLE_FULL_PATH> /var/lock/<SAMPLE>
  • sh -c cat /etc/inittab | grep -v \"/var/lock/<SAMPLE>\" > /etc/inittab2
  • sh -c crontab -l | grep /var/lock/<SAMPLE> || (crontab -l ; echo \"* * * * * /var/lock/<SAMPLE> > /dev/null 2>&1 &\") | crontab - > /dev/null 2>&1 &
  • grep -v /var/lock/<SAMPLE>
  • grep /var/lock/<SAMPLE>
  • sh -c echo \"0:2345:respawn:/var/lock/<SAMPLE>\" >> /etc/inittab2
  • sh -c cp -f <SAMPLE_FULL_PATH> /var/run/<SAMPLE>
  • cp -f <SAMPLE_FULL_PATH> /var/run/<SAMPLE>
  • sh -c cat /etc/inittab | grep -v \"/var/run/<SAMPLE>\" > /etc/inittab2
  • sh -c crontab -l | grep /var/run/<SAMPLE> || (crontab -l ; echo \"* * * * * /var/run/<SAMPLE> > /dev/null 2>&1 &\") | crontab - > /dev/null 2>&1 &
  • grep /var/run/<SAMPLE>
  • grep -v /var/run/<SAMPLE>
  • sh -c echo \"0:2345:respawn:/var/run/<SAMPLE>\" >> /etc/inittab2
Performs operations with the file system:
Modifies file access rights:
  • /var/spool/cron/crontabs/tmp.tmg00i
  • /var/spool/cron/crontabs/tmp.0nbFAt
  • /var/spool/cron/crontabs/tmp.qG0jzz
  • /var/spool/cron/crontabs/tmp.T3OVV1
  • /var/spool/cron/crontabs/tmp.srQwhw
Creates or modifies files:
  • /etc/inittab2
  • /var/spool/cron/crontabs/tmp.tmg00i
  • /dev/shm/<SAMPLE>
  • /var/spool/cron/crontabs/tmp.0nbFAt
  • /var/tmp/<SAMPLE>
  • /var/spool/cron/crontabs/tmp.qG0jzz
  • /var/lock/<SAMPLE>
  • /run/lock/<SAMPLE>
  • /var/spool/cron/crontabs/tmp.T3OVV1
  • /var/run/<SAMPLE>
  • /run/<SAMPLE>
  • /var/spool/cron/crontabs/tmp.srQwhw
Deletes files:
  • /etc/inittab2
Network activity:
Awaits incoming connections on ports:
  • 127.0.0.1:59000
Establishes connection:
  • <LOCAL_DNS_SERVER>
  • 46.###.233.35:2407
Connects to the following servers over the IRC protocol:
  • Server: 18#.#1.149.22; Command: NICK M|b|0|7425145|unknown\nUSER muhstik localhost localhost :muhstik-11052018\n
  • Server: 18#.#1.149.22; Command: PONG :9D8BCEE4\n
  • Server: 18#.#1.149.22; Command: PONG :5B3AA73E\n
  • Server: 46.##9.233.35; Command: NICK M|b|0|7425145|unknown\nUSER muhstik localhost localhost :muhstik-11052018\n
  • Server: 46.##9.233.35; Command: PONG :E69AC9AD\n
  • Server: 18#.#1.149.22; Command: PONG :4C22226B\n
  • Server: 18#.#1.149.22; Command: PONG :225C519\n
  • Server: 46.##9.233.35; Command: PONG :942FC910\n
  • Server: 46.##9.233.35; Command: PONG :973DEDF7\n
  • Server: 46.##9.233.35; Command: PONG :9058609E\n
  • Server: 46.##9.233.35; Command: PONG :A5142736\n
  • Server: 46.##9.233.35; Command: PONG :B3EE2962\n
  • Server: 18#.#1.149.22; Command: PONG :F33E8679\n
  • Server: 18#.#1.149.22; Command: PONG :C0D3F04\n
  • Server: 18#.#1.149.22; Command: PONG :7C269A2F\n
  • Server: 18#.#1.149.22; Command: PONG :5B48F5FC\n
  • Server: 18#.#1.149.22; Command: PONG :5456DEA5\n
DNS ASK:
  • ir#.##-zahlung.eu
  • ir#.####schland-zahlung.net

Curing recommendations


Linux

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Free trial

One month (no registration) or three months (registration and renewal discount)

Download Dr.Web

Download by serial number