JavaScript support is required for our site to be fully operational in your browser.
Linux.Packed.41
Added to the Dr.Web virus database:
2017-11-16
Virus description added:
2017-11-16
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
/var/spool/cron/crontabs/root
/etc/inittab
/etc/rc.local
Malicious functions:
Launches itself as a daemon
Modifies router settings:
Launches processes:
sh -c echo \"nameserver 8.8.8.8\" > /etc/resolv.conf &
sh -c chmod 700 <SAMPLE_FULL_PATH> > /dev/null 2>&1 &
chmod 700 <SAMPLE_FULL_PATH>
sh -c touch -acmr /bin/ls <SAMPLE_FULL_PATH>
touch -acmr /bin/ls <SAMPLE_FULL_PATH>
sh -c (crontab -l | grep -v \"<SAMPLE_FULL_PATH>\" | grep -v \"no cron\" | grep -v \"lesshts/run.sh\" > /var/run/.x00846930886) > /dev/null 2>&1
crontab -l
grep -v <SAMPLE_FULL_PATH>
grep -v no cron
grep -v lesshts/run.sh
sh -c echo \"* * * * * <SAMPLE_FULL_PATH> > /dev/null 2>&1 &\" >> /var/run/.x00846930886
sh -c crontab /var/run/.x00846930886
crontab /var/run/.x00846930886
sh -c rm -rf /var/run/.x00846930886
rm -rf /var/run/.x00846930886
sh -c cat /etc/inittab | grep -v \"<SAMPLE_FULL_PATH>\" > /etc/inittab2
cat /etc/inittab
sh -c echo \"0:2345:respawn:<SAMPLE_FULL_PATH>\" >> /etc/inittab2
sh -c cat /etc/inittab2 > /etc/inittab
cat /etc/inittab2
sh -c rm -rf /etc/inittab2
rm -rf /etc/inittab2
sh -c touch -acmr /bin/ls /etc/inittab
touch -acmr /bin/ls /etc/inittab
sh -c /bin/uname -n
sh -c nvram get router_name
/bin/uname -n
Performs operations with the file system:
Modifies file access rights:
<SAMPLE_FULL_PATH>
/var/spool/cron/crontabs/tmp.dZvYNg
Creates or modifies files:
/etc/resolv.conf
/var/run/.x00846930886
/run/.x00846930886
/var/spool/cron/crontabs/tmp.dZvYNg
/etc/inittab2
Deletes files:
/var/run/.x00846930886
/etc/inittab2
Network activity:
Awaits incoming connections on ports:
Connects to the following servers over the IRC protocol:
Server: 14#.#4.163.168; Command: NICK x86|0|709557|unknown\nUSER x00 localhost localhost :1.0+tftp_jun112017\n
Server: 14#.#4.163.168; Command: PONG :4D1F8E47\n
Server: 14#.#4.163.168; Command: MODE x86|0|709557|unknown -xi\n
Server: 14#.#4.163.168; Command: MODE x86|0|709557|unknown +B\n
Server: 14#.#4.163.168; Command: JOIN #m.x86 :777\n
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK