Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
JgR39HaU3e.elf

Overview

General Information

Sample name:JgR39HaU3e.elf
renamed because original name is a hash value
Original sample name:ad1deca9989f26e5ce4a38169a55e313.elf
Analysis ID:1406944
MD5:ad1deca9989f26e5ce4a38169a55e313
SHA1:e0aeb6e0acc3d7f1765574723a830f715e74075b
SHA256:83f7b9cddb84313d7004183918ed7e859ba0876ae0d366a7b26e5b5124bf9001
Tags:32elfmirairenesas
Infos:

Detection

Mirai, Moobot
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1406944
Start date and time:2024-03-11 19:03:19 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:JgR39HaU3e.elf
renamed because original name is a hash value
Original Sample Name:ad1deca9989f26e5ce4a38169a55e313.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@2/0
  • VT rate limit hit for: JgR39HaU3e.elf
Command:/tmp/JgR39HaU3e.elf
PID:5453
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
JgR39HaU3e.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    JgR39HaU3e.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xa7c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa7d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa7e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa7fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa810:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa824:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa838:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa84c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa860:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa89c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa8b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa8c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa8d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa8ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa900:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa93c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xa950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5453.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
      5453.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xa7c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa7d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa7e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa7fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa810:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa824:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa838:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa84c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa860:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa89c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa8b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa8c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa8d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa8ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa900:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa93c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5457.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5457.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xa7c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa7d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa7e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa7fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa810:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa824:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa838:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa84c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa860:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa89c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa8b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa8c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa8d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa8ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa900:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa93c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xa950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        5467.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
          Click to see the 20 entries
          Timestamp:03/11/24-19:04:08.838500
          SID:2030491
          Source Port:40838
          Destination Port:55650
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/11/24-19:04:06.804083
          SID:2030491
          Source Port:40836
          Destination Port:55650
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: JgR39HaU3e.elfAvira: detected

          Networking

          barindex
          Source: TrafficSnort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.13:40836 -> 154.9.29.154:55650
          Source: TrafficSnort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.13:40838 -> 154.9.29.154:55650
          Source: global trafficTCP traffic: 192.168.2.13:40836 -> 154.9.29.154:55650
          Source: unknownDNS traffic detected: queries for: wcjwcj.cn

          System Summary

          barindex
          Source: JgR39HaU3e.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5453.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5457.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5467.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5458.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5455.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5461.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5465.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5453, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5455, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5457, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5458, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5461, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5465, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5467, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: /tmp/JgR39HaU3e.elf (PID: 5458)SIGKILL sent: pid: 5461, result: no such processJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5461)SIGKILL sent: pid: -5455, result: unknownJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5465)SIGKILL sent: pid: 5458, result: successfulJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5467)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
          Source: JgR39HaU3e.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5453.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5457.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5467.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5458.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5455.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5461.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5465.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5453, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5455, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5457, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5458, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5461, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5465, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: JgR39HaU3e.elf PID: 5467, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@2/0
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/238/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/239/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/241/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/371/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/134/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/35/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/260/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/261/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/262/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/142/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/263/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/264/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/265/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/145/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/266/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/267/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/268/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/269/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/270/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/271/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/272/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/273/cmdlineJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5457)File opened: /proc/274/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/JgR39HaU3e.elf (PID: 5453)File: /tmp/JgR39HaU3e.elfJump to behavior
          Source: /tmp/JgR39HaU3e.elf (PID: 5453)Queries kernel information via 'uname': Jump to behavior
          Source: JgR39HaU3e.elf, 5453.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5455.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5457.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5458.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5461.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5465.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5467.1.00007fffe2045000.00007fffe2066000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
          Source: JgR39HaU3e.elf, 5453.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5455.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5457.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5458.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5461.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5465.1.00007fffe2045000.00007fffe2066000.rw-.sdmp, JgR39HaU3e.elf, 5467.1.00007fffe2045000.00007fffe2066000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/JgR39HaU3e.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/JgR39HaU3e.elf
          Source: JgR39HaU3e.elf, 5453.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5455.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5457.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5458.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5461.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5465.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5467.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
          Source: JgR39HaU3e.elf, 5453.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5455.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5457.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5458.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5461.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5465.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmp, JgR39HaU3e.elf, 5467.1.00005602b3dd7000.00005602b3e3a000.rw-.sdmpBinary or memory string: V5!/etc/qemu-binfmt/sh4

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: JgR39HaU3e.elf, type: SAMPLE
          Source: Yara matchFile source: 5453.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5457.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5467.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5458.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5455.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5461.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5465.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: JgR39HaU3e.elf PID: 5453, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: JgR39HaU3e.elf PID: 5455, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: JgR39HaU3e.elf PID: 5465, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: JgR39HaU3e.elf PID: 5467, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: Yara matchFile source: JgR39HaU3e.elf, type: SAMPLE
          Source: Yara matchFile source: 5453.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5457.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5467.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5458.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5455.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5461.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5465.1.00007fd7b8400000.00007fd7b840d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: JgR39HaU3e.elf PID: 5453, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: JgR39HaU3e.elf PID: 5455, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: JgR39HaU3e.elf PID: 5465, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: JgR39HaU3e.elf PID: 5467, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1406944 Sample: JgR39HaU3e.elf Startdate: 11/03/2024 Architecture: LINUX Score: 84 25 wcjwcj.cn 154.9.29.154, 40836, 40838, 55650 ENDOFFICEUS United States 2->25 27 Snort IDS alert for network traffic 2->27 29 Malicious sample detected (through community Yara rule) 2->29 31 Antivirus / Scanner detection for submitted sample 2->31 33 2 other signatures 2->33 10 JgR39HaU3e.elf 2->10         started        signatures3 process4 signatures5 35 Sample deletes itself 10->35 13 JgR39HaU3e.elf 10->13         started        process6 process7 15 JgR39HaU3e.elf 13->15         started        17 JgR39HaU3e.elf 13->17         started        process8 19 JgR39HaU3e.elf 15->19         started        21 JgR39HaU3e.elf 15->21         started        process9 23 JgR39HaU3e.elf 19->23         started       
          SourceDetectionScannerLabelLink
          JgR39HaU3e.elf100%AviraEXP/ELF.Mirai.Z.A
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          wcjwcj.cn
          154.9.29.154
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            154.9.29.154
            wcjwcj.cnUnited States
            64249ENDOFFICEUStrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            154.9.29.154n2pg2vVhEO.elfGet hashmaliciousMirai, MoobotBrowse
              J6yrFHwNuC.elfGet hashmaliciousMirai, MoobotBrowse
                sg123JWcuU.elfGet hashmaliciousMirai, MoobotBrowse
                  HePOITlRYk.elfGet hashmaliciousMirai, MoobotBrowse
                    4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      wcjwcj.cnn2pg2vVhEO.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      J6yrFHwNuC.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      sg123JWcuU.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      HePOITlRYk.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ENDOFFICEUSn2pg2vVhEO.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      J6yrFHwNuC.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      sg123JWcuU.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      HePOITlRYk.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
                      • 154.9.29.154
                      MnR9Zf2F4a.elfGet hashmaliciousMiraiBrowse
                      • 156.96.125.231
                      3mPS6MjiRe.elfGet hashmaliciousMiraiBrowse
                      • 38.242.18.217
                      kyQ6tISCd6.elfGet hashmaliciousMiraiBrowse
                      • 154.13.19.154
                      GenOJdFvy7.elfGet hashmaliciousMiraiBrowse
                      • 156.96.125.243
                      z8kSnLJt9Y.elfGet hashmaliciousMiraiBrowse
                      • 156.96.125.226
                      No context
                      No context
                      No created / dropped files found
                      File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                      Entropy (8bit):6.837213107906121
                      TrID:
                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                      File name:JgR39HaU3e.elf
                      File size:50'576 bytes
                      MD5:ad1deca9989f26e5ce4a38169a55e313
                      SHA1:e0aeb6e0acc3d7f1765574723a830f715e74075b
                      SHA256:83f7b9cddb84313d7004183918ed7e859ba0876ae0d366a7b26e5b5124bf9001
                      SHA512:f59dcd9c47e00f30198942734350fd52122aed1de73e6d6f0ec1e7108e20ff23604ce2fac1459170c569f20cfc725da523d8787da8af95256c0e04676f9a5200
                      SSDEEP:1536:0aeLe/MfGsTj5mjcKwlKzwUJGCVHdhnj:0RLeGGsH0DwNUJGehnj
                      TLSH:AE336A77E46A5E94C086817075249F351F23B1C893932EBB16EAC2B55483DACF509FF8
                      File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@.X...X...............\...\.A.\.A.d...8%..........Q.td............................././"O.n........#.*@........#.*@.....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                      ELF header

                      Class:ELF32
                      Data:2's complement, little endian
                      Version:1 (current)
                      Machine:<unknown>
                      Version Number:0x1
                      Type:EXEC (Executable file)
                      OS/ABI:UNIX - System V
                      ABI Version:0
                      Entry Point Address:0x4001a0
                      Flags:0x9
                      ELF Header Size:52
                      Program Header Offset:52
                      Program Header Size:32
                      Number of Program Headers:3
                      Section Header Offset:50176
                      Section Header Size:40
                      Number of Section Headers:10
                      Header String Table Index:9
                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                      NULL0x00x00x00x00x0000
                      .initPROGBITS0x4000940x940x300x00x6AX004
                      .textPROGBITS0x4000e00xe00xa5e00x00x6AX0032
                      .finiPROGBITS0x40a6c00xa6c00x240x00x6AX004
                      .rodataPROGBITS0x40a6e40xa6e40x19740x00x2A004
                      .ctorsPROGBITS0x41c05c0xc05c0x80x00x3WA004
                      .dtorsPROGBITS0x41c0640xc0640x80x00x3WA004
                      .dataPROGBITS0x41c0700xc0700x3500x00x3WA004
                      .bssNOBITS0x41c3c00xc3c00x21d40x00x3WA004
                      .shstrtabSTRTAB0x00xc3c00x3e0x00x0001
                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                      LOAD0x00x4000000x4000000xc0580xc0586.89850x5R E0x10000.init .text .fini .rodata
                      LOAD0xc05c0x41c05c0x41c05c0x3640x25382.72160x6RW 0x10000.ctors .dtors .data .bss
                      GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      03/11/24-19:04:08.838500TCP2030491ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)4083855650192.168.2.13154.9.29.154
                      03/11/24-19:04:06.804083TCP2030491ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)4083655650192.168.2.13154.9.29.154
                      TimestampSource PortDest PortSource IPDest IP
                      Mar 11, 2024 19:04:06.642446995 CET4083655650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:06.803596973 CET5565040836154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:06.803699970 CET4083655650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:06.804083109 CET4083655650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:06.964996099 CET5565040836154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:06.965013027 CET5565040836154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:06.965027094 CET5565040836154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:06.965054035 CET4083655650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:06.969248056 CET4083655650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:07.130464077 CET5565040836154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:08.676945925 CET4083855650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:08.838068008 CET5565040838154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:08.838197947 CET4083855650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:08.838500023 CET4083855650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:08.999586105 CET5565040838154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:08.999608040 CET5565040838154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:08.999622107 CET5565040838154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:08.999741077 CET4083855650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:09.001382113 CET4083855650192.168.2.13154.9.29.154
                      Mar 11, 2024 19:04:09.160804033 CET5565040838154.9.29.154192.168.2.13
                      Mar 11, 2024 19:04:09.162095070 CET5565040838154.9.29.154192.168.2.13
                      TimestampSource PortDest PortSource IPDest IP
                      Mar 11, 2024 19:04:06.169292927 CET5908853192.168.2.138.8.8.8
                      Mar 11, 2024 19:04:06.641769886 CET53590888.8.8.8192.168.2.13
                      Mar 11, 2024 19:04:08.155185938 CET5199853192.168.2.138.8.8.8
                      Mar 11, 2024 19:04:08.676269054 CET53519988.8.8.8192.168.2.13
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Mar 11, 2024 19:04:06.169292927 CET192.168.2.138.8.8.80xb493Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                      Mar 11, 2024 19:04:08.155185938 CET192.168.2.138.8.8.80xb493Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Mar 11, 2024 19:04:06.641769886 CET8.8.8.8192.168.2.130xb493No error (0)wcjwcj.cn154.9.29.154A (IP address)IN (0x0001)false
                      Mar 11, 2024 19:04:08.676269054 CET8.8.8.8192.168.2.130xb493No error (0)wcjwcj.cn154.9.29.154A (IP address)IN (0x0001)false

                      System Behavior

                      Start time (UTC):18:04:05
                      Start date (UTC):11/03/2024
                      Path:/tmp/JgR39HaU3e.elf
                      Arguments:/tmp/JgR39HaU3e.elf
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):18:04:05
                      Start date (UTC):11/03/2024
                      Path:/tmp/JgR39HaU3e.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):18:04:05
                      Start date (UTC):11/03/2024
                      Path:/tmp/JgR39HaU3e.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):18:04:05
                      Start date (UTC):11/03/2024
                      Path:/tmp/JgR39HaU3e.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):18:04:05
                      Start date (UTC):11/03/2024
                      Path:/tmp/JgR39HaU3e.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):18:04:07
                      Start date (UTC):11/03/2024
                      Path:/tmp/JgR39HaU3e.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):18:04:07
                      Start date (UTC):11/03/2024
                      Path:/tmp/JgR39HaU3e.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9