My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets



Added to the Dr.Web virus database: 2017-03-17

Virus description added:


  • b56178f89fb04790c6069efcfefc22560edce237 (ARM)
  • 780304f61e00e08d102a77bea2fc0404abac5e0e (x86)
  • e1cff2ae566a13a425dee9b5c6f5275ecb763e53 (M68K)
  • 4ced6e3d57d531944f82f1ab1a41a21bfae1ee1f (MIPS)
  • e214a71947bc57e3ab00524cdeda4c2ff24dad84 (MIPSEL)
  • 9cb64b74e951dd65fc4943cc81179e79c6e18ab2 (PPC)
  • d76e2c462b618acc1b67e457de6d14d16fc0fe11 (SH4)
  • 8738cc20b6a3ef42466acace285fbca24a59edc8 (SPARC)

Trojan capable of infecting Linux devices. There are versions for the following architectures: Intel x86, M68K, MIPS, MIPSEL, SPARC, SH4, Power PC, ARM. Designed to carry out DDoS attacks. It is spread by means of the SH script (042141c06a102861755dbc28afd48de5a63a8c24). After being launched, it waits for the Internet connection. In case of successful connection, it connects to its command and control server and sends it information about the infected device. The transferred data looks as follows:

"SYS/sn/$(uname -o)/nn/$(uname -n)/vr/$(uname -v)/me/$(uname -m)/build/1.377/"

Then the Trojan sends the PING request to the C&C server and waits for commands. It can execute the following commands:

UD Execute command and wait for its completion
SH Execute command in background mode
EXIT Terminate itself
HTTP Launch DDoS attack on the indicated host Assumes the name of the attacked host and the duration of the attack in seconds in the parameters

The commands are sent to the Trojan without encryption, as a plain text, the parameters are separated. During operation, the malware uses the following list of DNS servers:

Curing recommendations


After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Free trial

One month (no registration) or three months (registration and renewal discount)

Download Dr.Web

Download by serial number