Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Linux.Siggen.6795

Added to the Dr.Web virus database: 2024-03-18

Virus description added:

Technical Information

Malicious functions:
Launches itself as a daemon
Substitutes application name for:
  • pubi3a872gpg2vkmv2nibtuj
Launches processes:
  • /bin/kmod /sbin/modprobe ip_tables
  • /sbin/xtables-multi iptables -A INPUT -s 141.98.10.128 -j DROP
  • /bin/sh -c echo \x22block drop proto udp from any to any port 59666\x22 | sudo pfctl -f -
  • /sbin/xtables-multi iptables -A INPUT -p tcp --dport 59666 -j DROP
  • /bin/sh -c ufw deny 59666/udp
  • /bin/sh -c netsh advfirewall firewall add rule name=\x22Block_IP_141.98.10.128\x22 dir=in action=block remoteip=141.98.10.128
  • /bin/sh -c nft add rule ip filter input udp dport 37215 drop
  • /sbin/xtables-multi iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • /bin/sh -c echo \x22127.0.0.1 reachedfucktheccp.top\x22 >> /etc/hosts
  • /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • /bin/sh -c ufw deny 59666/tcp
  • /bin/sh -c echo \x22block drop proto tcp from any to any port 59666\x22 | sudo pfctl -f -
  • /bin/sh -c firewall-cmd --reload
  • /bin/sh -c netsh advfirewall firewall add rule name=\x22Block_Port_59666_TCP\x22 dir=in action=block protocol=TCP localport=59666
  • /bin/sh -c iptables -A INPUT -s 141.98.10.128 -j DROP
  • /sbin/xtables-multi iptables -A INPUT -p udp --dport 59666 -j DROP
  • /bin/sh -c /bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • /bin/sh -c ufw deny from 141.98.10.128
  • /bin/sh -c kill_port(htons(37215))
  • /bin/sh -c firewall-cmd --zone=public --add-source=141.98.10.128 --permanent
  • /bin/sh -c firewall-cmd --zone=public --add-port=59666/udp --permanent
  • /bin/sh -c netsh advfirewall firewall add rule name=\x22Block_Port_37215_TCP\x22 dir=in action=block protocol=TCP localport=37215
  • /bin/sh -c busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • /bin/sh -c kill_port(htons(59666))
  • /bin/sh -c echo \x22block drop proto tcp from any to any port 37215\x22 | sudo pfctl -f -
  • /bin/sh -c netsh advfirewall firewall add rule name=\x22Block_Port_59666_UDP\x22 dir=in action=block protocol=UDP localport=59666
  • /bin/sh -c /usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • /bin/sh -c netsh advfirewall firewall add rule name=\x22Block_Port_37215_UDP\x22 dir=in action=block protocol=UDP localport=37215
  • /bin/sh -c iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • /bin/sh -c nft add rule ip filter input tcp dport 37215 drop
  • /sbin/xtables-multi iptables -A INPUT -p tcp --dport 37215 -j DROP
  • /bin/sh -c ufw deny 37215/udp
  • /bin/sh -c iptables -A INPUT -p tcp --dport 59666 -j DROP
  • /bin/sh -c echo \x22127.0.0.1 fucktheccp.top\x22 >> /etc/hosts
  • /bin/sh -c firewall-cmd --zone=public --add-rich-rule=\x27rule family=\x22ipv4\x22 port protocol=\x22udp\x22 port=\x2237215\x22 reject\x27
  • /sbin/xtables-multi iptables -A INPUT -p udp --dport 37215 -j DROP
  • /bin/sh -c firewall-cmd --zone=public --add-port=59666/tcp --permanent
  • /bin/sh -c echo \x22block drop in quick on any from 141.98.10.128\x22 | sudo pfctl -f -
  • /bin/sh -c nft add rule ip filter input udp dport 59666 drop
  • /bin/sh -c iptables -A INPUT -p udp --dport 37215 -j DROP
  • sudo pfctl -f -
  • /bin/sh -c iptables -A INPUT -p udp --dport 59666 -j DROP
  • /bin/sh -c firewall-cmd --zone=public --add-rich-rule=\x27rule family=\x22ipv4\x22 port protocol=\x22tcp\x22 port=\x2237215\x22 reject\x27
  • /bin/sh -c /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • /bin/sh -c echo \x22block drop proto udp from any to any port 37215\x22 | sudo pfctl -f -
  • /bin/sh -c iptables -A INPUT -p tcp --dport 37215 -j DROP
  • /bin/sh -c ufw deny 37215/tcp
  • /bin/sh -c nft add rule ip filter input ip saddr 141.98.10.128 drop
  • /bin/sh -c nft add rule ip filter input tcp dport 59666 drop
Kills the following processes:
  • pubi3a872gpg2vk
Performs operations with the file system:
Deletes folders:
  • /null
Creates or modifies files:
  • /etc/hosts
Deletes files:
  • /null
Network activity:
Awaits incoming connections on ports:
  • 127.0.0.1:8345
  • 0.0.0.0:26721
Establishes connection:
  • [:##]:37215
  • 127.0.0.1:37215
  • [:##]:59666
  • 127.0.0.1:59666
  • 8.#.8.8:53
  • 51.##.149.139:53
  • 19#.###.175.43:35342
  • 19#.##.144.87:53
  • 19#.##9.175.43:2222
  • 51.###.108.203:53
  • 81.###.136.222:53
  • 91.###.137.37:53
DNS ASK:
  • re###thltd.com

Recommandations pour le traitement


Linux

Veuillez lancer le scan complet de toutes les partitions du disque à l'aide de Dr.Web Antivirus pour Linux.

Version démo gratuite

Pour 1 mois (sans enregistrement) ou 3 mois (avec enregistrement et remise pour le renouvellement)

Télécharger Dr.Web

Par le numéro de série