JavaScript support is required for our site to be fully operational in your browser.
Linux.Siggen.3574
Added to the Dr.Web virus database:
2021-02-04
Virus description added:
2021-02-04
Technical Information
Malicious functions:
Launches itself as a daemon
Substitutes application name for:
Launches processes:
sh -c ./lolgetfuk. fbot.update
./lolgetfuk. fbot.update
Kills the following processes:
Performs operations with the file system:
Creates or modifies files:
<SAMPLE_FULL_PATH>
/lolgetfuk.
Network activity:
Awaits incoming connections on ports:
Establishes connection:
8.#.8.8:53
19#.###.147.110:5634
17#.##8.147.13:23
11#.##9.121.104:23
21#.##.17.210:23
21#.##5.172.248:23
16#.##4.121.179:23
22#.##8.145.114:23
93.##.96.129:23
127.0.0.1:1337
Attacks using a special dictionary (brute-force technique) via the Telnet protocol.
HTTP GET requests:
http://###.###.147.110/uzdad.mips
Sends data to the following servers:
67.###.28.210:23
17#.##0.121.130:23
51.###.219.189:23
82.###.47.239:23
92.###.102.122:23
42.##1.26.50:23
18#.##7.244.153:23
13#.##.226.69:23
84.###.170.243:23
19#.###.147.110:5634
Receives data from the following servers:
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK