JavaScript support is required for our site to be fully operational in your browser.
Linux.Siggen.4342
Added to the Dr.Web virus database:
2022-01-21
Virus description added:
2022-01-21
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Launches processes:
/bin/sh -c rm -rf bin/busybox && mkdir bin; >bin/busybox && mv <SAMPLE_FULL_PATH> bin/busybox; chmod 777 bin/busybox
rm -rf bin/busybox
mkdir bin
mv <SAMPLE_FULL_PATH> bin/busybox
chmod 777 bin/busybox
Performs operations with the file system:
Modifies file access rights:
Creates folders:
Creates or modifies files:
/root/bin/busybox
<SAMPLE_FULL_PATH>
Deletes files:
Network activity:
Awaits incoming connections on ports:
Establishes connection:
Attacks using a special dictionary (brute-force technique) via the Telnet protocol.
DNS ASK:
Sends data to the following servers:
11#.##9.38.193:23
16#.##.242.136:23
50.#.212.197:23
91.##.248.199:23
95.###.223.104:23
46.##.10.189:23
22#.##.41.226:23
15#.##1.6.255:23
19#.##9.122.168:23
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK