JavaScript support is required for our site to be fully operational in your browser.
Linux.Siggen.7166
Added to the Dr.Web virus database:
2024-04-18
Virus description added:
2024-04-18
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Kills the following processes:
kthreadd
rcu_gp
rcu_par_gp
kworker/0:0H
kworker/u2:0
mm_percpu_wq
rcu_tasks_rude_
rcu_tasks_trace
ksoftirqd/0
rcu_sched
migration/0
kworker/0:1
cpuhp/0
kdevtmpfs
netns
kauditd
khungtaskd
oom_reaper
writeback
kcompactd0
ksmd
khugepaged
kintegrityd
kblockd
blkcg_punt_bio
edac-poller
devfreq_wq
kworker/0:1H
kswapd0
kthrotld
acpi_thermal_pm
ipv6_addrconf
kworker/u2:1
kworker/u2:2
kstrp
zswap-shrink
kworker/u3:0
kworker/0:2
ata_sff
scsi_eh_0
scsi_tmf_0
scsi_eh_1
scsi_tmf_1
jbd2/sda1-8
ext4-rsv-conver
ttm_swap
kworker/u2:3
kworker/0:0
9bc2fd2a
Network activity:
Awaits incoming connections on ports:
Establishes connection:
8.#.8.8:53
45.###.232.208:33335
Attacks using a special dictionary (brute-force technique) via the Telnet protocol.
DNS ASK:
Sends data to the following servers:
Receives data from the following servers:
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK