GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

By Roman Sharkov San Downloaded a virus for Linux lately and unpacked it. Tried to run it as root, didn't work. Googled for 2 hours, found out that instead of /usr/local/bin the virus unpacked to /usr/bin for which the user malware doesn't have any write permissions, therefore the virus couldn't create a process file. Found patched . configure and .make files on some Chinese forum, recompiled Tem Cee The virus said it needs the library cmalw-lib-2.0. Turns out cmalw-lib-2.0 is shipped with CentOS but not with Ubuntu. Googled for hours again and found an instruction to build a .deb package from source. The virus finally started, wrote some logs, made a core dump and crashed. After 1 hour of going through the logs | discovered the virus assumed it was running on ext4 and called into its disk encryption API. Under btrfs this API is deprecated. The kernel noticed and made this partition read-only. Opened the sources, grep'ed the Bitcoin wallet and sent $5 out of pity.

Download link

https://media-akkoma-fedi-nlpagan-net.ilja.space/media/95eeed9c-a1f0-4ef9-ae79-228ff42258a7/virus.jpg

Notices where this attachment appears

  1. Embed this notice
    Paul (paul@fedi.nlpagan.net)'s status on Monday, 14-Aug-2023 02:03:55 JST Paul Paul
    #linux #virus #lol
    In conversation Monday, 14-Aug-2023 02:03:55 JST from fedi.nlpagan.net permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.