Linux.Siggen.4016
Added to the Dr.Web virus database:
2021-06-30
Virus description added:
2021-06-30
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- /var/spool/cron/crontabs/root
- /etc/inittab
- /etc/rc.local
Malicious functions:
Gets access to SSH keys
- /root/.ssh/config
- /root/.ssh/known_hosts
Modifies router settings:
Stops system services:
- service httpd stop
- service telnetd stop
- service sshd stop
- systemctl stop httpd.service
- systemctl stop telnetd.service
- systemctl stop sshd.service
Launches processes:
- sh -c touch -acmr /bin/ls <SAMPLE_FULL_PATH>
- touch -acmr /bin/ls <SAMPLE_FULL_PATH>
- sh -c (crontab -l | grep -v \"<SAMPLE_FULL_PATH>\" | grep -v \"no cron\" | grep -v \"lesshts/run.sh\" > /var/run/.x00740882966) > /dev/null 2>&1
- crontab -l
- grep -v no cron
- grep -v <SAMPLE_FULL_PATH>
- grep -v lesshts/run.sh
- sh -c echo \"* * * * * <SAMPLE_FULL_PATH> > /dev/null 2>&1 &\" >> /var/run/.x00740882966
- sh -c crontab /var/run/.x00740882966
- crontab /var/run/.x00740882966
- sh -c rm -rf /var/run/.x00740882966
- rm -rf /var/run/.x00740882966
- sh -c cat /etc/inittab | grep -v \"<SAMPLE_FULL_PATH>\" > /etc/inittab2
- cat /etc/inittab
- sh -c echo \"0:2345:respawn:<SAMPLE_FULL_PATH>\" >> /etc/inittab2
- sh -c cat /etc/inittab2 > /etc/inittab
- cat /etc/inittab2
- sh -c rm -rf /etc/inittab2
- rm -rf /etc/inittab2
- sh -c touch -acmr /bin/ls /etc/inittab
- touch -acmr /bin/ls /etc/inittab
- sh -c /bin/uname -n
- sh -c nvram get router_name
- /bin/uname -n
- sh -c kill -9 `cat /var/run/httpd.pid` > /dev/null 2>&1 &
- cat /var/run/httpd.pid
- sh -c service httpd stop > /dev/null 2>&1 &
- sh -c killall -9 mini_httpd > /dev/null 2>&1 &
- sh -c killall -9 minihttpd > /dev/null 2>&1 &
- sh -c kill -9 `cat /var/run/thttpd.pid` > /dev/null 2>&1 &
- cat /var/run/thttpd.pid
- sh -c nvram set httpd_enable=0 > /dev/null 2>&1
- sh -c killall -9 httpd > /dev/null 2>&1 &
- sh -c service telnetd stop > /dev/null 2>&1 &
- sh -c service sshd stop > /dev/null 2>&1 &
- sh -c killall -9 telnetd > /dev/null 2>&1 &
- sh -c killall -9 utelnetd > /dev/null 2>&1 &
- sh -c killall -9 dropbear > /dev/null 2>&1 &
- sh -c killall -9 sshd > /dev/null 2>&1 &
- sh -c killall -9 lighttpd > /dev/null 2>&1 &
- sh -c export PATH=/bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin;( kill -9 `cat /var/run/dropbear.pid` `cat /var/run/sshd.pid` ; killall -9 tty0 tty1 tty4 tty5 tty6 sshd dropbear ; /etc/init.d/dropbear stop ; rm -rf /var/run/tt* /tmp/tt* )>/dev/null 2>&1 &
- cat /var/run/dropbear.pid
- cat /var/run/sshd.pid
- /etc/init.d/dropbear stop
- rm -rf /var/run/tt* /tmp/tt*
Attempts to kill system processes:
- killall -9 mini_httpd
- killall -9 minihttpd
- killall -9 httpd
- killall -9 telnetd
- killall -9 utelnetd
- killall -9 dropbear
- killall -9 sshd
Kills system processes:
Attempts to kill the following processes:
- killall -9 lighttpd
- killall -9 tty0 tty1 tty4 tty5 tty6 sshd dropbear
Performs operations with the file system:
Modifies file access rights:
- /var/spool/cron/crontabs/tmp.2A1FxU
Creates or modifies files:
- /var/run/.x00740882966
- /run/.x00740882966
- /var/spool/cron/crontabs/tmp.2A1FxU
- /etc/inittab2
Deletes files:
- /var/run/.x00740882966
- /etc/inittab2
- /var/run/tt*
- /tmp/tt*
Network activity:
Awaits incoming connections on ports:
Attacks using a special dictionary (brute-force technique) via the SSH protocol
Connects to the following servers over the IRC protocol:
- Server: 83.#9.77.2; Command: NICK M|o|0|939809|unknown\nUSER x00 localhost localhost :1.0+tftp_s\n
- Server: 83.#9.77.2; Command: MODE M|o|0|939809|unknown -xi\n
- Server: 83.#9.77.2; Command: MODE M|o|0|939809|unknown +B\n
- Server: 83.#9.77.2; Command: JOIN #0x00 :777\n
- Server: 83.#9.77.2; Command: NOTICE bot :\n
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息