Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
n2pg2vVhEO.elf

Overview

General Information

Sample name:n2pg2vVhEO.elf
renamed because original name is a hash value
Original sample name:e9090baed4c24b2d29608be3b3b8adb8.elf
Analysis ID:1406943
MD5:e9090baed4c24b2d29608be3b3b8adb8
SHA1:fcda0002623b246d4b3ee300979907be0c0320a4
SHA256:6341e6049a7020e19c01c4c3da699bfffc72c7933fe16e9538fd4a598831ac58
Tags:32elfmiraimotorola
Infos:

Detection

Mirai, Moobot
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1406943
Start date and time:2024-03-11 19:00:17 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:n2pg2vVhEO.elf
renamed because original name is a hash value
Original Sample Name:e9090baed4c24b2d29608be3b3b8adb8.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@2/0
  • VT rate limit hit for: n2pg2vVhEO.elf
Command:/tmp/n2pg2vVhEO.elf
PID:5542
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
n2pg2vVhEO.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    n2pg2vVhEO.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xd313:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd327:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd33b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd34f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd363:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd377:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd38b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd39f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd3b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd3c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd3db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd3ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd403:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd417:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd42b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd43f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd453:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd467:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd47b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd48f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd4a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5558.1.00007f48cc001000.00007f48cc010000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
      5558.1.00007f48cc001000.00007f48cc010000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd313:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd327:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd33b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd34f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd363:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd377:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd38b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd39f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd403:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd417:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd42b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd43f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd453:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd467:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd47b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd48f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd4a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5547.1.00007f48cc001000.00007f48cc010000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5547.1.00007f48cc001000.00007f48cc010000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xd313:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd327:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd33b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd34f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd363:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd377:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd38b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd39f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd3b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd3c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd3db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd3ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd403:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd417:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd42b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd43f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd453:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd467:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd47b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd48f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd4a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        5542.1.00007f48cc001000.00007f48cc010000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
          Click to see the 21 entries
          Timestamp:03/11/24-19:01:07.007979
          SID:2030491
          Source Port:41916
          Destination Port:55650
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/11/24-19:01:04.985370
          SID:2030491
          Source Port:41914
          Destination Port:55650
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: n2pg2vVhEO.elfAvira: detected

          Networking

          barindex
          Source: TrafficSnort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.15:41914 -> 154.9.29.154:55650
          Source: TrafficSnort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.15:41916 -> 154.9.29.154:55650
          Source: global trafficTCP traffic: 192.168.2.15:41914 -> 154.9.29.154:55650
          Source: unknownDNS traffic detected: queries for: wcjwcj.cn

          System Summary

          barindex
          Source: n2pg2vVhEO.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5558.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5547.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5542.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5546.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5556.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5544.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5550.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5544, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5546, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5547, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5550, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5556, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5558, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: /tmp/n2pg2vVhEO.elf (PID: 5547)SIGKILL sent: pid: 5550, result: no such processJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5550)SIGKILL sent: pid: -5544, result: unknownJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5556)SIGKILL sent: pid: 5547, result: successfulJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5558)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
          Source: n2pg2vVhEO.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5558.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5547.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5542.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5546.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5556.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5544.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5550.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5544, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5546, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5547, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5550, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5556, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: n2pg2vVhEO.elf PID: 5558, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@2/0
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/88/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/89/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/91/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/92/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/93/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/94/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/95/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/96/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/97/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/98/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/99/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/133/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/35/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/260/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/261/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/262/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/142/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/263/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/264/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/265/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/145/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/266/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/267/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/268/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/269/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/270/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/271/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/158/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/202/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/203/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/204/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/205/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/206/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/207/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/208/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/209/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/210/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/211/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/212/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/213/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/215/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/77/cmdlineJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5546)File opened: /proc/78/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/n2pg2vVhEO.elf (PID: 5542)File: /tmp/n2pg2vVhEO.elfJump to behavior
          Source: /tmp/n2pg2vVhEO.elf (PID: 5542)Queries kernel information via 'uname': Jump to behavior
          Source: n2pg2vVhEO.elf, 5542.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5544.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5546.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5547.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5550.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5556.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5558.1.00007ffff84e0000.00007ffff8501000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/n2pg2vVhEO.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/n2pg2vVhEO.elf
          Source: n2pg2vVhEO.elf, 5542.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5544.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5546.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5547.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5550.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5556.1.00007ffff84e0000.00007ffff8501000.rw-.sdmp, n2pg2vVhEO.elf, 5558.1.00007ffff84e0000.00007ffff8501000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
          Source: n2pg2vVhEO.elf, 5542.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5544.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5546.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5547.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5550.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5556.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5558.1.000056530042f000.00005653004b4000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
          Source: n2pg2vVhEO.elf, 5542.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5544.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5546.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5547.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5550.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5556.1.000056530042f000.00005653004b4000.rw-.sdmp, n2pg2vVhEO.elf, 5558.1.000056530042f000.00005653004b4000.rw-.sdmpBinary or memory string: "CSVP CSV!/etc/qemu-binfmt/m68k

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: n2pg2vVhEO.elf, type: SAMPLE
          Source: Yara matchFile source: 5558.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5547.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5542.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5546.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5556.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5544.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5550.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5544, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5546, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5547, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5550, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5556, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5558, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: Yara matchFile source: n2pg2vVhEO.elf, type: SAMPLE
          Source: Yara matchFile source: 5558.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5547.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5542.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5546.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5556.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5544.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5550.1.00007f48cc001000.00007f48cc010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5544, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5546, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5547, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5550, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5556, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: n2pg2vVhEO.elf PID: 5558, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1406943 Sample: n2pg2vVhEO.elf Startdate: 11/03/2024 Architecture: LINUX Score: 84 25 wcjwcj.cn 154.9.29.154, 41914, 41916, 55650 ENDOFFICEUS United States 2->25 27 Snort IDS alert for network traffic 2->27 29 Malicious sample detected (through community Yara rule) 2->29 31 Antivirus / Scanner detection for submitted sample 2->31 33 2 other signatures 2->33 10 n2pg2vVhEO.elf 2->10         started        signatures3 process4 signatures5 35 Sample deletes itself 10->35 13 n2pg2vVhEO.elf 10->13         started        process6 process7 15 n2pg2vVhEO.elf 13->15         started        17 n2pg2vVhEO.elf 13->17         started        process8 19 n2pg2vVhEO.elf 15->19         started        21 n2pg2vVhEO.elf 15->21         started        process9 23 n2pg2vVhEO.elf 19->23         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          n2pg2vVhEO.elf100%AviraEXP/ELF.Mirai.Z.A
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          wcjwcj.cn
          154.9.29.154
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            154.9.29.154
            wcjwcj.cnUnited States
            64249ENDOFFICEUStrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            154.9.29.154sg123JWcuU.elfGet hashmaliciousMirai, MoobotBrowse
              HePOITlRYk.elfGet hashmaliciousMirai, MoobotBrowse
                4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  wcjwcj.cnsg123JWcuU.elfGet hashmaliciousMirai, MoobotBrowse
                  • 154.9.29.154
                  HePOITlRYk.elfGet hashmaliciousMirai, MoobotBrowse
                  • 154.9.29.154
                  4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
                  • 154.9.29.154
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ENDOFFICEUSsg123JWcuU.elfGet hashmaliciousMirai, MoobotBrowse
                  • 154.9.29.154
                  HePOITlRYk.elfGet hashmaliciousMirai, MoobotBrowse
                  • 154.9.29.154
                  4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
                  • 154.9.29.154
                  MnR9Zf2F4a.elfGet hashmaliciousMiraiBrowse
                  • 156.96.125.231
                  3mPS6MjiRe.elfGet hashmaliciousMiraiBrowse
                  • 38.242.18.217
                  kyQ6tISCd6.elfGet hashmaliciousMiraiBrowse
                  • 154.13.19.154
                  GenOJdFvy7.elfGet hashmaliciousMiraiBrowse
                  • 156.96.125.243
                  z8kSnLJt9Y.elfGet hashmaliciousMiraiBrowse
                  • 156.96.125.226
                  Q9WWwskOzG.elfGet hashmaliciousMiraiBrowse
                  • 156.96.125.249
                  87T8fOc6se.elfGet hashmaliciousMiraiBrowse
                  • 154.9.28.251
                  No context
                  No context
                  No created / dropped files found
                  File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                  Entropy (8bit):6.207180136589802
                  TrID:
                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                  File name:n2pg2vVhEO.elf
                  File size:61'700 bytes
                  MD5:e9090baed4c24b2d29608be3b3b8adb8
                  SHA1:fcda0002623b246d4b3ee300979907be0c0320a4
                  SHA256:6341e6049a7020e19c01c4c3da699bfffc72c7933fe16e9538fd4a598831ac58
                  SHA512:309139181bb3998fb8066e744bef4af35a2341a7cf3d7e1fce77da89742cd52cd1c4d3bee5ead87da36abeec6f88bd076e3b293738f10ac355421f035f5d8c82
                  SSDEEP:1536:m7Eg48H0K+3a38/yph8Ci+HaJEc7DnbaNmMaW8YDi:m7E98Ul3a48h8mHwEcfSv8YDi
                  TLSH:C9532B9AF801CE7DF85BD77B4457090AB632B3D112831B3613A7B997BC731A81D22E85
                  File Content Preview:.ELF.......................D...4...t.....4. ...(.................................. ....................d..%$...... .dt.Q............................NV..a....da....dN^NuNV..J9...4f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy....N.X........4N^NuNV..N^NuN

                  ELF header

                  Class:ELF32
                  Data:2's complement, big endian
                  Version:1 (current)
                  Machine:MC68000
                  Version Number:0x1
                  Type:EXEC (Executable file)
                  OS/ABI:UNIX - System V
                  ABI Version:0
                  Entry Point Address:0x80000144
                  Flags:0x0
                  ELF Header Size:52
                  Program Header Offset:52
                  Program Header Size:32
                  Number of Program Headers:3
                  Section Header Offset:61300
                  Section Header Size:40
                  Number of Section Headers:10
                  Header String Table Index:9
                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                  NULL0x00x00x00x00x0000
                  .initPROGBITS0x800000940x940x140x00x6AX002
                  .textPROGBITS0x800000a80xa80xd18e0x00x6AX004
                  .finiPROGBITS0x8000d2360xd2360xe0x00x6AX002
                  .rodataPROGBITS0x8000d2440xd2440x19860x00x2A002
                  .ctorsPROGBITS0x80010bd00xebd00x80x00x3WA004
                  .dtorsPROGBITS0x80010bd80xebd80x80x00x3WA004
                  .dataPROGBITS0x80010be40xebe40x3500x00x3WA004
                  .bssNOBITS0x80010f340xef340x21c00x00x3WA004
                  .shstrtabSTRTAB0x00xef340x3e0x00x0001
                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                  LOAD0x00x800000000x800000000xebca0xebca6.24740x5R E0x2000.init .text .fini .rodata
                  LOAD0xebd00x80010bd00x80010bd00x3640x25242.80850x6RW 0x2000.ctors .dtors .data .bss
                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  03/11/24-19:01:07.007979TCP2030491ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)4191655650192.168.2.15154.9.29.154
                  03/11/24-19:01:04.985370TCP2030491ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)4191455650192.168.2.15154.9.29.154
                  TimestampSource PortDest PortSource IPDest IP
                  Mar 11, 2024 19:01:04.819298029 CET4191455650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:04.984883070 CET5565041914154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:04.984963894 CET4191455650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:04.985369921 CET4191455650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:05.146254063 CET5565041914154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:05.146311998 CET5565041914154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:05.146327972 CET4191455650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:05.146347046 CET5565041914154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:05.307488918 CET5565041914154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:06.846369982 CET4191655650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:07.007616043 CET5565041916154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:07.007745981 CET4191655650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:07.007978916 CET4191655650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:07.168942928 CET5565041916154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:07.169198990 CET5565041916154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:07.169236898 CET5565041916154.9.29.154192.168.2.15
                  Mar 11, 2024 19:01:07.169295073 CET4191655650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:07.171789885 CET4191655650192.168.2.15154.9.29.154
                  Mar 11, 2024 19:01:07.332762003 CET5565041916154.9.29.154192.168.2.15
                  TimestampSource PortDest PortSource IPDest IP
                  Mar 11, 2024 19:01:04.630438089 CET3510253192.168.2.158.8.8.8
                  Mar 11, 2024 19:01:04.818391085 CET53351028.8.8.8192.168.2.15
                  Mar 11, 2024 19:01:06.674141884 CET3631753192.168.2.158.8.8.8
                  Mar 11, 2024 19:01:06.845762014 CET53363178.8.8.8192.168.2.15
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Mar 11, 2024 19:01:04.630438089 CET192.168.2.158.8.8.80xf03bStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                  Mar 11, 2024 19:01:06.674141884 CET192.168.2.158.8.8.80xf03bStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Mar 11, 2024 19:01:04.818391085 CET8.8.8.8192.168.2.150xf03bNo error (0)wcjwcj.cn154.9.29.154A (IP address)IN (0x0001)false
                  Mar 11, 2024 19:01:06.845762014 CET8.8.8.8192.168.2.150xf03bNo error (0)wcjwcj.cn154.9.29.154A (IP address)IN (0x0001)false

                  System Behavior

                  Start time (UTC):18:01:03
                  Start date (UTC):11/03/2024
                  Path:/tmp/n2pg2vVhEO.elf
                  Arguments:/tmp/n2pg2vVhEO.elf
                  File size:4463432 bytes
                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                  Start time (UTC):18:01:04
                  Start date (UTC):11/03/2024
                  Path:/tmp/n2pg2vVhEO.elf
                  Arguments:-
                  File size:4463432 bytes
                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                  Start time (UTC):18:01:04
                  Start date (UTC):11/03/2024
                  Path:/tmp/n2pg2vVhEO.elf
                  Arguments:-
                  File size:4463432 bytes
                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                  Start time (UTC):18:01:04
                  Start date (UTC):11/03/2024
                  Path:/tmp/n2pg2vVhEO.elf
                  Arguments:-
                  File size:4463432 bytes
                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                  Start time (UTC):18:01:04
                  Start date (UTC):11/03/2024
                  Path:/tmp/n2pg2vVhEO.elf
                  Arguments:-
                  File size:4463432 bytes
                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                  Start time (UTC):18:01:06
                  Start date (UTC):11/03/2024
                  Path:/tmp/n2pg2vVhEO.elf
                  Arguments:-
                  File size:4463432 bytes
                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                  Start time (UTC):18:01:06
                  Start date (UTC):11/03/2024
                  Path:/tmp/n2pg2vVhEO.elf
                  Arguments:-
                  File size:4463432 bytes
                  MD5 hash:cd177594338c77b895ae27c33f8f86cc