JavaScript support is required for our site to be fully operational in your browser.
Linux.Siggen.6830
Added to the Dr.Web virus database:
2024-03-21
Virus description added:
2024-03-20
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Launches processes:
/bin/sh -c ufw deny 37215/udp
/sbin/xtables-multi iptables -A INPUT -s 141.98.10.128 -j DROP
/bin/sh -c iptables - A INPUT - p udp --dport 8345 - j ACCEPT
/bin/sh -c echo \x22127.0.0.1 reachedfucktheccp.top\x22 >> /etc/hosts
/bin/sh -c nft add rule ip filter input tcp dport 37215 drop
/bin/sh -c busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
/sbin/xtables-multi iptables - A INPUT - p udp --dport 35342 - j ACCEPT
/sbin/xtables-multi iptables -A INPUT -p udp --dport 59666 -j DROP
/bin/kmod /sbin/modprobe ip_tables
/bin/sh -c echo \x22127.0.0.1 fucktheccp.top\x22 >> /etc/hosts
busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
/bin/sh -c iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
/bin/sh -c /bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
/sbin/xtables-multi iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
/bin/sh -c /usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
/bin/sh -c /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
/sbin/xtables-multi iptables -A INPUT -p tcp --dport 37215 -j DROP
/bin/sh -c iptables -F
/bin/sh -c iptables -A INPUT -p tcp --dport 59666 -j DROP
/sbin/xtables-multi iptables -A INPUT -s 85.196.9.193 -j DROP
/bin/sh -c nft add rule ip filter input udp dport 59666 drop
/sbin/xtables-multi iptables -A INPUT -p udp --dport 37215 -j DROP
/sbin/xtables-multi iptables -F
/bin/sh -c iptables - A INPUT - p tcp --dport 35342 - j ACCEPT
/bin/sh -c iptables -A INPUT -p udp --dport 37215 -j DROP
/bin/sh -c iptables -A INPUT -s 85.196.9.193 -j DROP
/sbin/xtables-multi iptables - A INPUT - p tcp --dport 8345 - j ACCEPT
/bin/sh -c iptables - A INPUT - p tcp --dport 8345 - j ACCEPT
/bin/sh -c iptables -A INPUT -s 141.98.10.128 -j DROP
/bin/sh -c iptables -A INPUT -p tcp --dport 37215 -j DROP
/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
/bin/sh -c iptables -A INPUT -p udp --dport 59666 -j DROP
/bin/sh -c iptables - A INPUT - p udp --dport 35342 - j ACCEPT
/bin/sh -c nft add rule ip filter input tcp dport 59666 drop
/sbin/xtables-multi iptables - A INPUT - p udp --dport 8345 - j ACCEPT
/bin/sh -c ufw deny 37215/tcp
/bin/sh -c nft add rule ip filter input udp dport 37215 drop
/sbin/xtables-multi iptables -A INPUT -p tcp --dport 59666 -j DROP
/sbin/xtables-multi iptables - A INPUT - p tcp --dport 35342 - j ACCEPT
Performs operations with the file system:
Modifies file access rights:
Deletes folders:
Creates or modifies files:
Deletes files:
Network activity:
Awaits incoming connections on ports:
19#.##8.210.50:8345
0.0.0.0:26721
0.0.0.0:33770
Establishes connection:
8.#.8.8:53
[:##]:37215
127.0.0.1:37215
[:##]:59666
127.0.0.1:59666
18#.##1.61.24:53
19#.###.175.20:35342
1.#.#.1:65535
DNS ASK:
Sends data to the following servers:
19#.###.175.20:35342
1.#.#.1:65535
Receives data from the following servers:
Other:
Collects information about network activity
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK