Linux.Siggen.3052
Added to the Dr.Web virus database:
2020-05-25
Virus description added:
2020-05-25
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Launches processes:
- sh -c rm -rf app/lib && mkdir app; >app/lib && mv <SAMPLE_FULL_PATH> app/lib; chmod 777 app/lib
- rm -rf app/lib
- mkdir app
- mv <SAMPLE_FULL_PATH> app/lib
- chmod 777 app/lib
Performs operations with the file system:
Modifies file access rights:
Creates folders:
Creates or modifies files:
- /app/lib
- <SAMPLE_FULL_PATH>
Deletes files:
Network activity:
Awaits incoming connections on ports:
Establishes connection:
- 8.#.8.8:53
- 45.##.168.97:6102
Attacks using a special dictionary (brute-force technique) via the Telnet protocol.
Attacks using a special dictionary (brute-force technique) via an undefined protocol.
Sends data to the following servers:
- 9.###.17.202:26
- 79.###.37.154:26
- 23#.#.174.53:26
- 63.##.85.118:26
- 20#.##1.60.64:23
- 3.###.146.130:26
- 12#.##3.70.129:26
- 45.##.168.97:6102
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
このウェブサイトを継続して訪問する場合、訪問者に関する統計データを収集するためのCookieファイルおよび他のテクノロジーを弊社が利用することに同意したものとします。詳細