this post was submitted on 14 Aug 2023
7 points (100.0% liked)

Programmer Humor

35334 readers
69 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS
 
top 11 comments
sorted by: hot top controversial new old
[–] [email protected] 3 points 2 years ago (1 children)

It's like that guy that posted an example Bitcoin miner on GitHub, then a bunch of script kiddies forgot to change his wallet info for their own before deploying... He made a good chunk of change by doing nothing malicious.

[–] [email protected] 1 points 2 years ago
[–] [email protected] 2 points 2 years ago

I laughed and my partner ask why. I told her it’s some really nerdy humor. She was fine not hearing the joke, but I loosely explained it anyway. She humored me anyway. She’s a good woman.

[–] [email protected] 2 points 2 years ago

if youre gonna write linux malware at least distribute it as a flatpak ffs

[–] [email protected] 1 points 2 years ago

Sorry, folks. Using cmalw-lib is now deprecated.

Cool kids are using systemd-malwd

[–] [email protected] 1 points 2 years ago

I guess the process could be regarded as gain of function research.

[–] [email protected] 1 points 2 years ago* (last edited 2 years ago) (1 children)

So, essentially, really poorly written malware? Given the number of assumptions it makes without any sort of robustness around system configuration it's about as good as any first-pass bash script.

It'd be a stretch to call it malware, it's probably an outright fabrication to call it a virus.

[–] [email protected] 1 points 2 years ago

This is.. clearly a meme..

[–] [email protected] 1 points 2 years ago

Text version:

Downloaded a virus for Linux lately and unpacked it. Tried to run it as root, didn't work. Googled for 2 hours, found out that instead of /usr/local/bin the virus unpacked to /usr/bin for which the user malware doesn't have any write permissions, therefore the virus couldn't create a process file. Found patched .configure and .make files on some Chinese forum, recompiled and rerun it. The virus said it needs the library cmalw-lib-2.0.Turns out cmalw-lib-2.0 is shipped with CentOS but not with Ubuntu. Googled for hours again and found an instruction to build a.deb package from source. The virus finally started, wrote some logs, made a core dump and crashed. After 1 hour of going through the logs I discovered the virus assumed it was running on ext4 and called into its disk encryption API. Under btrfs this API is deprecated. The kernel noticed and made this partition read-only

Opened the sources, grep'ed the Bitcoin wallet and sent $5 out of pity.

[–] [email protected] 0 points 2 years ago (1 children)
[–] [email protected] 1 points 2 years ago

Even if it were inspired, it is significantly different the way it's written. I've hit these same challenges before, so I'm more inclined to think it is independent discovery.