perl.ircbot.rel4y

Affects perl
Family IRCBot
Variant rel4y
Severity
HIGH
Signature Type {HEX} {MD5}
Detected by Linux Malware Detect (Maldet)

What is perl.ircbot.rel4y?

This malware category is related to malware and worms spread through IRCBots. The IRC connection is exploited to be used as a back door, allowing an attacker to perform a variety of actions on the compromised computer. A large number of affected computers are used as a bot net that are controlled by the IRC.

This is a malware written in the PERL script language. It is likely to be planted by a malicious user or worm after successful penetration. For successful execution of the malware, Perl scripting libraries are required.

Clean My Hacked Website Now

Website Malware Cleanup Website Malware Cleanup

Have you been hacked? Do you need help with fixing your website? We provide professional malware cleanup services to get your business back online quickly.

Removal of Security Warnings Removal of Security Warnings

If your website is hacked, your visitors may be shown a warning message. Astra will take the necessary steps to remove your website from the blacklists ASAP.

Astra Website Firewall (WAF) Website Firewall (WAF)

Stop future website hacks with Astra WAF & protect your website. No hassle out-of-the-box security tailored to your technology stack & CMSs like WordPress, Magento, Opencart etc.

Real Human Support Real Human Support

Astra's team of security engineers guide you through your security journey. We believe in customers first, so no waiting in long queues to get your queries answered.

This information is provided as part of the Astra community project. All information should be considered as-is, without guarantees. All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.If you are an owner of some content and want it to be removed, please mail to [email protected]