Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
HePOITlRYk.elf

Overview

General Information

Sample name:HePOITlRYk.elf
renamed because original name is a hash value
Original sample name:d0c35e9ac675852b9549916a64d0b203.elf
Analysis ID:1406938
MD5:d0c35e9ac675852b9549916a64d0b203
SHA1:9f903005d3e709437d569153e292c8833593bb74
SHA256:91c7dc1bd4820f31580e18c947a118599d18c0a6e953005fb26400a65666461d
Tags:32armelfmirai
Infos:

Detection

Mirai, Moobot
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1406938
Start date and time:2024-03-11 18:58:13 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:HePOITlRYk.elf
renamed because original name is a hash value
Original Sample Name:d0c35e9ac675852b9549916a64d0b203.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@2/0
  • VT rate limit hit for: HePOITlRYk.elf
Command:/tmp/HePOITlRYk.elf
PID:5429
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
HePOITlRYk.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    HePOITlRYk.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xcb20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcb34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcb48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcb5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcb70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcb84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcb98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcbac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcbc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcbd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcbe8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcbfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcc10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcc24:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcc38:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcc4c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcc60:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcc74:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcc88:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcc9c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xccb0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5429.1.00007f6f34017000.00007f6f34026000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
      5429.1.00007f6f34017000.00007f6f34026000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xcb20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbe8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc24:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc38:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc4c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc60:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc74:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc88:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc9c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xccb0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5434.1.00007f6f34017000.00007f6f34026000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5434.1.00007f6f34017000.00007f6f34026000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xcb20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcb34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcb48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcb5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcb70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcb84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcb98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcbac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcbc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcbd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcbe8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcbfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcc10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcc24:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcc38:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcc4c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcc60:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcc74:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcc88:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcc9c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xccb0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        5437.1.00007f6f34017000.00007f6f34026000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
          Click to see the 23 entries
          Timestamp:03/11/24-18:58:58.339321
          SID:2030491
          Source Port:40840
          Destination Port:55650
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/11/24-18:59:00.368004
          SID:2030491
          Source Port:40842
          Destination Port:55650
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: HePOITlRYk.elfAvira: detected

          Networking

          barindex
          Source: TrafficSnort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.13:40840 -> 154.9.29.154:55650
          Source: TrafficSnort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.13:40842 -> 154.9.29.154:55650
          Source: global trafficTCP traffic: 192.168.2.13:40840 -> 154.9.29.154:55650
          Source: unknownDNS traffic detected: queries for: wcjwcj.cn

          System Summary

          barindex
          Source: HePOITlRYk.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5429.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5434.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5437.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5433.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5441.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5431.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5443.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: HePOITlRYk.elf PID: 5429, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: HePOITlRYk.elf PID: 5431, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: HePOITlRYk.elf PID: 5433, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: HePOITlRYk.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: HePOITlRYk.elf PID: 5437, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: HePOITlRYk.elf PID: 5441, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: HePOITlRYk.elf PID: 5443, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: /tmp/HePOITlRYk.elf (PID: 5434)SIGKILL sent: pid: 5437, result: no such processJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5437)SIGKILL sent: pid: -5431, result: unknownJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5441)SIGKILL sent: pid: 5434, result: successfulJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5443)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
          Source: HePOITlRYk.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5429.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5434.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5437.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5433.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5441.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5431.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5443.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: HePOITlRYk.elf PID: 5429, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: HePOITlRYk.elf PID: 5431, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: HePOITlRYk.elf PID: 5433, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: HePOITlRYk.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: HePOITlRYk.elf PID: 5437, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: HePOITlRYk.elf PID: 5441, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: HePOITlRYk.elf PID: 5443, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@2/0
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/238/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/239/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/5273/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/3095/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/241/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/1906/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/1482/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/1480/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/371/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/1238/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/134/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/3413/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/3652/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5433)File opened: /proc/816/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/HePOITlRYk.elf (PID: 5429)File: /tmp/HePOITlRYk.elfJump to behavior
          Source: /tmp/HePOITlRYk.elf (PID: 5429)Queries kernel information via 'uname': Jump to behavior
          Source: HePOITlRYk.elf, 5429.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5431.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5433.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5434.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5437.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5441.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5443.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/HePOITlRYk.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/HePOITlRYk.elf
          Source: HePOITlRYk.elf, 5429.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5431.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5433.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5434.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5437.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5441.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5443.1.0000557302169000.0000557302297000.rw-.sdmpBinary or memory string: sU!/etc/qemu-binfmt/arm
          Source: HePOITlRYk.elf, 5429.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5431.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5433.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5434.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5437.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5441.1.0000557302169000.0000557302297000.rw-.sdmp, HePOITlRYk.elf, 5443.1.0000557302169000.0000557302297000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
          Source: HePOITlRYk.elf, 5429.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5431.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5433.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5434.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5437.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5441.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmp, HePOITlRYk.elf, 5443.1.00007ffe3ea2a000.00007ffe3ea4b000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: HePOITlRYk.elf, type: SAMPLE
          Source: Yara matchFile source: 5429.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5434.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5437.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5433.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5441.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5431.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5443.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5429, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5431, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5433, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5434, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5437, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5441, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5443, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: Yara matchFile source: HePOITlRYk.elf, type: SAMPLE
          Source: Yara matchFile source: 5429.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5434.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5437.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5433.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5441.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5431.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5443.1.00007f6f34017000.00007f6f34026000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5429, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5431, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5433, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5434, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5437, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5441, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: HePOITlRYk.elf PID: 5443, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1406938 Sample: HePOITlRYk.elf Startdate: 11/03/2024 Architecture: LINUX Score: 84 25 wcjwcj.cn 154.9.29.154, 40840, 40842, 55650 ENDOFFICEUS United States 2->25 27 Snort IDS alert for network traffic 2->27 29 Malicious sample detected (through community Yara rule) 2->29 31 Antivirus / Scanner detection for submitted sample 2->31 33 2 other signatures 2->33 10 HePOITlRYk.elf 2->10         started        signatures3 process4 signatures5 35 Sample deletes itself 10->35 13 HePOITlRYk.elf 10->13         started        process6 process7 15 HePOITlRYk.elf 13->15         started        17 HePOITlRYk.elf 13->17         started        process8 19 HePOITlRYk.elf 15->19         started        21 HePOITlRYk.elf 15->21         started        process9 23 HePOITlRYk.elf 19->23         started       
          SourceDetectionScannerLabelLink
          HePOITlRYk.elf100%AviraEXP/ELF.Mirai.Z.A
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          wcjwcj.cn
          154.9.29.154
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            154.9.29.154
            wcjwcj.cnUnited States
            64249ENDOFFICEUStrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            154.9.29.1544GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              wcjwcj.cn4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
              • 154.9.29.154
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              ENDOFFICEUS4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
              • 154.9.29.154
              MnR9Zf2F4a.elfGet hashmaliciousMiraiBrowse
              • 156.96.125.231
              3mPS6MjiRe.elfGet hashmaliciousMiraiBrowse
              • 38.242.18.217
              kyQ6tISCd6.elfGet hashmaliciousMiraiBrowse
              • 154.13.19.154
              GenOJdFvy7.elfGet hashmaliciousMiraiBrowse
              • 156.96.125.243
              z8kSnLJt9Y.elfGet hashmaliciousMiraiBrowse
              • 156.96.125.226
              Q9WWwskOzG.elfGet hashmaliciousMiraiBrowse
              • 156.96.125.249
              87T8fOc6se.elfGet hashmaliciousMiraiBrowse
              • 154.9.28.251
              Dc5V2L8ODq.elfGet hashmaliciousUnknownBrowse
              • 154.9.28.251
              xDZ7cKndQ8.elfGet hashmaliciousMiraiBrowse
              • 154.9.28.251
              No context
              No context
              No created / dropped files found
              File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
              Entropy (8bit):6.095555113042114
              TrID:
              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
              File name:HePOITlRYk.elf
              File size:59'636 bytes
              MD5:d0c35e9ac675852b9549916a64d0b203
              SHA1:9f903005d3e709437d569153e292c8833593bb74
              SHA256:91c7dc1bd4820f31580e18c947a118599d18c0a6e953005fb26400a65666461d
              SHA512:f367b38a28f4eb2ce7d4d2cecd7a2966986fe70a2e18a2c06be28327ac34d133afb913d511c17606006991ddc0c5aa9e59af76cc5be539f2298ed29908636cc5
              SSDEEP:1536:Fj7QguzvcqIMhqzU+c1VHeVT5iCsqXv+nj:FjQc/cbH2d9R+nj
              TLSH:B9434950F8819623C6D1137BFA6E468D3B2613E8E2DBB3079D225F2037C686B0D67E55
              File Content Preview:.ELF...a..........(.........4...d.......4. ...(.....................................................h...<%..........Q.td..................................-...L."...R2..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

              ELF header

              Class:ELF32
              Data:2's complement, little endian
              Version:1 (current)
              Machine:ARM
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:ARM - ABI
              ABI Version:0
              Entry Point Address:0x8190
              Flags:0x202
              ELF Header Size:52
              Program Header Offset:52
              Program Header Size:32
              Number of Program Headers:3
              Section Header Offset:59236
              Section Header Size:40
              Number of Section Headers:10
              Header String Table Index:9
              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
              NULL0x00x00x00x00x0000
              .initPROGBITS0x80940x940x180x00x6AX004
              .textPROGBITS0x80b00xb00xc9800x00x6AX0016
              .finiPROGBITS0x14a300xca300x140x00x6AX004
              .rodataPROGBITS0x14a440xca440x19740x00x2A004
              .ctorsPROGBITS0x1e3bc0xe3bc0x80x00x3WA004
              .dtorsPROGBITS0x1e3c40xe3c40x80x00x3WA004
              .dataPROGBITS0x1e3d00xe3d00x3540x00x3WA004
              .bssNOBITS0x1e7240xe7240x21d40x00x3WA004
              .shstrtabSTRTAB0x00xe7240x3e0x00x0001
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x80000x80000xe3b80xe3b86.13470x5R E0x8000.init .text .fini .rodata
              LOAD0xe3bc0x1e3bc0x1e3bc0x3680x253c2.63170x6RW 0x8000.ctors .dtors .data .bss
              GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              03/11/24-18:58:58.339321TCP2030491ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)4084055650192.168.2.13154.9.29.154
              03/11/24-18:59:00.368004TCP2030491ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)4084255650192.168.2.13154.9.29.154
              TimestampSource PortDest PortSource IPDest IP
              Mar 11, 2024 18:58:58.177895069 CET4084055650192.168.2.13154.9.29.154
              Mar 11, 2024 18:58:58.339029074 CET5565040840154.9.29.154192.168.2.13
              Mar 11, 2024 18:58:58.339106083 CET4084055650192.168.2.13154.9.29.154
              Mar 11, 2024 18:58:58.339320898 CET4084055650192.168.2.13154.9.29.154
              Mar 11, 2024 18:58:58.502165079 CET5565040840154.9.29.154192.168.2.13
              Mar 11, 2024 18:58:58.502186060 CET5565040840154.9.29.154192.168.2.13
              Mar 11, 2024 18:58:58.502202988 CET5565040840154.9.29.154192.168.2.13
              Mar 11, 2024 18:58:58.502284050 CET4084055650192.168.2.13154.9.29.154
              Mar 11, 2024 18:58:58.503951073 CET4084055650192.168.2.13154.9.29.154
              Mar 11, 2024 18:58:58.666754007 CET5565040840154.9.29.154192.168.2.13
              Mar 11, 2024 18:59:00.206319094 CET4084255650192.168.2.13154.9.29.154
              Mar 11, 2024 18:59:00.367202997 CET5565040842154.9.29.154192.168.2.13
              Mar 11, 2024 18:59:00.367414951 CET4084255650192.168.2.13154.9.29.154
              Mar 11, 2024 18:59:00.368004084 CET4084255650192.168.2.13154.9.29.154
              Mar 11, 2024 18:59:00.528501987 CET5565040842154.9.29.154192.168.2.13
              Mar 11, 2024 18:59:00.528549910 CET5565040842154.9.29.154192.168.2.13
              Mar 11, 2024 18:59:00.528815031 CET5565040842154.9.29.154192.168.2.13
              Mar 11, 2024 18:59:00.528913021 CET4084255650192.168.2.13154.9.29.154
              Mar 11, 2024 18:59:00.531202078 CET4084255650192.168.2.13154.9.29.154
              Mar 11, 2024 18:59:00.689903021 CET5565040842154.9.29.154192.168.2.13
              Mar 11, 2024 18:59:00.692029953 CET5565040842154.9.29.154192.168.2.13
              TimestampSource PortDest PortSource IPDest IP
              Mar 11, 2024 18:58:57.830420017 CET5751153192.168.2.138.8.8.8
              Mar 11, 2024 18:58:58.177232981 CET53575118.8.8.8192.168.2.13
              Mar 11, 2024 18:58:59.871087074 CET4219153192.168.2.138.8.8.8
              Mar 11, 2024 18:59:00.205589056 CET53421918.8.8.8192.168.2.13
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Mar 11, 2024 18:58:57.830420017 CET192.168.2.138.8.8.80x9cf5Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
              Mar 11, 2024 18:58:59.871087074 CET192.168.2.138.8.8.80x9cf5Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Mar 11, 2024 18:58:58.177232981 CET8.8.8.8192.168.2.130x9cf5No error (0)wcjwcj.cn154.9.29.154A (IP address)IN (0x0001)false
              Mar 11, 2024 18:59:00.205589056 CET8.8.8.8192.168.2.130x9cf5No error (0)wcjwcj.cn154.9.29.154A (IP address)IN (0x0001)false

              System Behavior

              Start time (UTC):17:58:56
              Start date (UTC):11/03/2024
              Path:/tmp/HePOITlRYk.elf
              Arguments:/tmp/HePOITlRYk.elf
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):17:58:56
              Start date (UTC):11/03/2024
              Path:/tmp/HePOITlRYk.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):17:58:56
              Start date (UTC):11/03/2024
              Path:/tmp/HePOITlRYk.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):17:58:56
              Start date (UTC):11/03/2024
              Path:/tmp/HePOITlRYk.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):17:58:56
              Start date (UTC):11/03/2024
              Path:/tmp/HePOITlRYk.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):17:58:58
              Start date (UTC):11/03/2024
              Path:/tmp/HePOITlRYk.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):17:58:58
              Start date (UTC):11/03/2024
              Path:/tmp/HePOITlRYk.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1