Linux.Mirai.2362
Added to the Dr.Web virus database:
2019-04-22
Virus description added:
2019-04-22
Technical Information
Malicious functions:
Removes itself
Launches itself as a daemon
Substitutes application name for:
Kills system processes:
Performs operations with the file system:
Creates folders:
- /home/harry
- /home/harry/Videos
- /home/harry/Videos/Mirai-Source-Code-master
- /home/harry/Videos/Mirai-Source-Code-master/mirai
Creates or modifies files:
- /home/harry/Videos/Mirai-Source-Code-master/mirai/util.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/table.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/scanner.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/resolv.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/rand.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/main.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/killer.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/checksum.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/attack_udp.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/attack_tcp.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/attack_gre.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/attack.gcda
- /home/harry/Videos/Mirai-Source-Code-master/mirai/attack_app.gcda
Network activity:
Awaits incoming connections on ports:
- 127.0.0.1:48101
- 0.0.0.0:23
- 0.0.0.0:22
Establishes connection:
- 8.#.8.8:53
- 65.###.202.53:80
Attacks using a special dictionary (brute-force technique) via the Telnet protocol.
Sends data to the following servers:
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
このウェブサイトを継続して訪問する場合、訪問者に関する統計データを収集するためのCookieファイルおよび他のテクノロジーを弊社が利用することに同意したものとします。詳細