マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Linux.Mirai.2362

Added to the Dr.Web virus database: 2019-04-22

Virus description added:

Technical Information

Malicious functions:
Removes itself
Launches itself as a daemon
Substitutes application name for:
  • 4qewqklm31wjqu1p77i7
Kills system processes:
  • sshd
Performs operations with the file system:
Creates folders:
  • /home/harry
  • /home/harry/Videos
  • /home/harry/Videos/Mirai-Source-Code-master
  • /home/harry/Videos/Mirai-Source-Code-master/mirai
Creates or modifies files:
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/util.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/table.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/scanner.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/resolv.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/rand.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/main.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/killer.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/checksum.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/attack_udp.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/attack_tcp.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/attack_gre.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/attack.gcda
  • /home/harry/Videos/Mirai-Source-Code-master/mirai/attack_app.gcda
Network activity:
Awaits incoming connections on ports:
  • 127.0.0.1:48101
  • 0.0.0.0:23
  • 0.0.0.0:22
Establishes connection:
  • 8.#.8.8:53
  • 65.###.202.53:80
Attacks using a special dictionary (brute-force technique) via the Telnet protocol.
Sends data to the following servers:
  • 65.###.202.53:80

Curing recommendations


Linux

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Free trial

One month (no registration) or three months (registration and renewal discount)

Download Dr.Web

Download by serial number