JavaScript support is required for our site to be fully operational in your browser.
Linux.Packed.238
Added to the Dr.Web virus database:
2018-12-09
Virus description added:
2018-12-09
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Launches processes:
sh -c /var/tmp/vrxwme vrxw &
/var/tmp/vrxwme vrxw
sh -c /var/tmp/dclyre &
/var/tmp/dclyre
sh -c /var/tmp/pnvfye pnvf &
/var/tmp/pnvfye pnvf
sh -c /var/tmp/myxmpv dbln &
/var/tmp/myxmpv dbln
sh -c /var/tmp/wfbuqv wfbu &
/var/tmp/wfbuqv wfbu
Kills the following processes:
/var/tmp/vrxwme
/var/tmp/dclyre
Unknown process with PID: 722
Unknown process with PID: 724
Unknown process with PID: 729
Performs operations with the file system:
Modifies file access rights:
/var/tmp/vrxwme
/var/tmp/dclyre
/var/tmp/pnvfye
/var/tmp/myxmpv
/var/tmp/wfbuqv
Creates or modifies files:
/var/tmp/vrxwme
/var/tmp/ps
/var/tmp/dclyre
/var/tmp/.tmp
/var/tmp/pnvfye
/var/tmp/myxmpv
/var/tmp/wfbuqv
Deletes files:
/var/tmp/vrxwme
/var/tmp/dclyre
/var/tmp/pnvfye
/var/tmp/myxmpv
/var/tmp/wfbuqv
Locks files:
/var/tmp/ps
/var/tmp/.tmp
Network activity:
Establishes connection:
HTTP GET requests:
18#.###.169.6/jm/jrd
18#.###.169.6/jm/lmmml
18#.###.169.6/jm/jpp
HTTP POST requests:
Receives data from the following servers:
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK