Linux.Siggen.3053
Added to the Dr.Web virus database:
2020-05-25
Virus description added:
2020-05-25
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Launches processes:
- /bin/sh -c rm -rf app/lib && mkdir app; >app/lib && mv <SAMPLE_FULL_PATH> app/lib; chmod 777 app/lib
- rm -rf app/lib
- mkdir app
- mv <SAMPLE_FULL_PATH> app/lib
- chmod 777 app/lib
Performs operations with the file system:
Modifies file access rights:
Creates folders:
Creates or modifies files:
- /app/lib
- <SAMPLE_FULL_PATH>
Deletes files:
Network activity:
Awaits incoming connections on ports:
Establishes connection:
- 8.#.8.8:53
- 45.##.168.97:6102
Attacks using a special dictionary (brute-force technique) via the Telnet protocol.
Attacks using a special dictionary (brute-force technique) via an undefined protocol.
Sends data to the following servers:
- 23#.##0.104.30:2323
- 21#.##1.73.114:26
- 13#.##5.151.91:26
- 11#.##.142.231:2323
- 15#.##8.110.38:2323
- 22#.#.200.125:26
- 19#.##2.137.43:2323
- 45.##.168.97:6102
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
このウェブサイトを継続して訪問する場合、訪問者に関する統計データを収集するためのCookieファイルおよび他のテクノロジーを弊社が利用することに同意したものとします。詳細