• some_guy@lemmy.sdf.org
    link
    fedilink
    arrow-up
    6
    ·
    11 months ago

    I laughed and my partner ask why. I told her it’s some really nerdy humor. She was fine not hearing the joke, but I loosely explained it anyway. She humored me anyway. She’s a good woman.

  • UnverifiedAPK@lemmy.ml
    link
    fedilink
    arrow-up
    5
    ·
    11 months ago

    It’s like that guy that posted an example Bitcoin miner on GitHub, then a bunch of script kiddies forgot to change his wallet info for their own before deploying… He made a good chunk of change by doing nothing malicious.

  • douglasg14b@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    11 months ago

    So, essentially, really poorly written malware? Given the number of assumptions it makes without any sort of robustness around system configuration it’s about as good as any first-pass bash script.

    It’d be a stretch to call it malware, it’s probably an outright fabrication to call it a virus.

    • chinpokomon@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      11 months ago

      Even if it were inspired, it is significantly different the way it’s written. I’ve hit these same challenges before, so I’m more inclined to think it is independent discovery.

  • Cwilliams@beehaw.org
    link
    fedilink
    arrow-up
    1
    ·
    8 months ago

    Text version:

    Downloaded a virus for Linux lately and unpacked it. Tried to run it as root, didn’t work. Googled for 2 hours, found out that instead of /usr/local/bin the virus unpacked to /usr/bin for which the user malware doesn’t have any write permissions, therefore the virus couldn’t create a process file. Found patched .configure and .make files on some Chinese forum, recompiled and rerun it. The virus said it needs the library cmalw-lib-2.0.Turns out cmalw-lib-2.0 is shipped with CentOS but not with Ubuntu. Googled for hours again and found an instruction to build a.deb package from source. The virus finally started, wrote some logs, made a core dump and crashed. After 1 hour of going through the logs I discovered the virus assumed it was running on ext4 and called into its disk encryption API. Under btrfs this API is deprecated. The kernel noticed and made this partition read-only

    Opened the sources, grep’ed the Bitcoin wallet and sent $5 out of pity.

  • vsis@feddit.cl
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Sorry, folks. Using cmalw-lib is now deprecated.

    Cool kids are using systemd-malwd