rm -rf /tmp/*
killall -q -9 /var/tmp/.postgres/*
ps aux | grep -v grep | grep 'runnerbus' | awk '{print $2}' | xargs -i kill -9 {}
ps aux | grep -v grep | grep 'redis.sh' | awk '{print $2}' | xargs -i kill -9 {}
ps aux | grep -v grep | grep '/tmp/system' | awk '{print $2}' | xargs -i kill -9 {}
rm -rf /var/tmp/.postgres
rm -rf /tmp/.*
rm -rf /var/tmp/.*
rm -rf /etc/cron.hourly/oanacroner
rm -rf /etc/cron.hourly/oanacrona
rm -rf /etc/cron.daily/oanacroner
rm -rf /etc/cron.daily/oanacrona
rm -rf /etc/cron.monthly/oanacroner
rm -rf xmrig-6.13.1/
rm -rf xmrig-6.13.1-linux-x64.tar.gz
rm -rf $HOME/moneroocean/
rm -rf /var/tmp/moneroocean/
rm -rf /root/moneroocean/
rm -rf $HOME/c3pool/
rm -rf /tmp/.tmp/xlog
rm -rf /var/tmp/.postgres
rm -rf /tmp/kwolker
rm -rf /tmp/kdevtmpfsi
rm -rf /tmp/kinsing
rm -rf /tmp/libexec
rm -rf /tmp/mym
rm -rf /usr/bin/kinsing*
rm -rf /etc/cron.d/kinsing*
ps aux | grep -v grep | grep 'postgres_start.sh' | awk '{print $2}' | xargs -i kill -9 {}
ps aux | grep -v grep | grep '/var/tmp/.postgres_start/postgres_start.sh' | awk '{print $2}' | xargs -i kill -9 {}
killall -q -9 workrun.sh
killall -q -9 /tmp/kwolker
killall -q -9 /
View Code
What is XMRIG Virus?
XMRIG Virus is a completely legitimate open-source application that utilizes system CPUs to mine
Monero cryptocurrency
. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUPs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.
Cryptomining is a process by which computers solve various mathematical equations. For each solution, a fraction of a cryptocurrency coin (in this case, Monero) is rewarded. The more powerful the hardware, the more revenue you generate. In fact, using low-end hardware is inefficient - electricity use is equivalent to, or higher, than revenue generated. Therefore, the entire process is costly and often not viable. To avoid this problem, criminals employ regular users' computers. They infiltrate systems with cryptomining applications (in this case, XMRIG Virus) and generate revenue passively. Note that victims receive nothing in return for the use of their systems. Furthermore, the mining process can take up to 100% of hardware (in this case, CPU) resources. This renders computers unstable and virtually unusable - they barely respond and might crash, leading to possible permanent data loss. In addition, fully-utilized hardware generates excessive heat. In certain circumstances (high room temperatures, bad cooling systems, etc.), mining can damage the hardware - components simply overheat. For these reasons, cryptomining applications that infiltrated the system without permission must be uninstalled immediately (even if they are legitimate).
As mentioned above, there is a high probability that the XMRIG Virus came together with a number of adware-type PUPs. These programs deliver various intrusive advertisements (e.g., coupons, banners, pop-ups, etc.) To achieve this, developers employ various tools that enable placement of third party graphical content on any site. Therefore, intrusive ads often conceal underlying website content, thereby significantly diminishing the browsing experience. In addition, the ads might redirect to malicious sites and even execute scripts that stealthily download and install malware/PUPs. Therefore, even a single accidental click can result in high-risk computer infections. Another important issue is data tracking. Research shows that adware typically gathers various data (e.g., IP addresses, website URLs visited, pages viewed, search queries, keystrokes, etc.) that includes personal information. This data is shared with third parties (potentially, cyber criminals) who generate revenue by misusing personal details. The presence of data-tracking apps can thus lead to serious privacy issues or even identity theft. You are strongly advised to uninstall all potentially unwanted programs immediately.
GitHub - xmrig/xmrig: RandomX, CryptoNight, AstroBWT and Argon2 CPU/GPU miner
dnf install clamav
freshclam
clamscan file
clamscan --recursive --infected --quiet --log /var/log/clamscan.log --follow-dir-symlinks=2 --follow-file-symlinks=2 --remove --move=/opt/infected