Linux.Siggen.3002
Added to the Dr.Web virus database:
2020-05-19
Virus description added:
2020-05-18
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Launches processes:
- sh -c mkdir app && >app/lib && cd app/lib; mv <SAMPLE_FULL_PATH> app/lib; chmod 777 app/lib
- mkdir app
- mv <SAMPLE_FULL_PATH> app/lib
- chmod 777 app/lib
Kills system processes:
Performs operations with the file system:
Modifies file access rights:
Creates folders:
Creates or modifies files:
- /root/app/lib
- <SAMPLE_FULL_PATH>
Network activity:
Awaits incoming connections on ports:
Establishes connection:
- 8.#.8.8:53
- 19#.##6.146.53:4708
Attacks using a special dictionary (brute-force technique) via the Telnet protocol.
Attacks using a special dictionary (brute-force technique) via an undefined protocol.
Sends data to the following servers:
- 21#.#.149.97:23
- 23.###.212.188:26
- 49.##.135.169:23
- 17#.##.147.203:23
- 5.##.136.186:26
- 24#.##8.43.65:26
- 19#.##6.146.53:4708
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
このウェブサイトを継続して訪問する場合、訪問者に関する統計データを収集するためのCookieファイルおよび他のテクノロジーを弊社が利用することに同意したものとします。詳細