Source: vmpcow.elf |
ReversingLabs: Detection: 13% |
Source: Yara match |
File source: vmpcow.elf, type: SAMPLE |
Source: vmpcow.elf |
String found in binary or memory: www.yahoo.com equals www.yahoo.com (Yahoo) |
Source: vmpcow.elf |
String found in binary or memory: www.yahoo.com0 equals www.yahoo.com (Yahoo) |
Source: vmpcow.elf |
String found in binary or memory: http://bit.ly/14GZzcT) |
Source: vmpcow.elf |
String found in binary or memory: http://clients1.google.com/ocsp0 |
Source: vmpcow.elf |
String found in binary or memory: http://crl.geotrust.com/crls/gtglobal.crl0= |
Source: vmpcow.elf |
String found in binary or memory: http://crl.geotrust.com/crls/secureca.crl0N |
Source: vmpcow.elf |
String found in binary or memory: http://failsafe.fp.yahoo.com/404.html |
Source: vmpcow.elf |
String found in binary or memory: http://gtglobal-ocsp.geotrust.com0 |
Source: vmpcow.elf |
String found in binary or memory: http://nmap.org/svn/docs/nmap.xsl |
Source: vmpcow.elf |
String found in binary or memory: http://nmap.org/svn/docs/nmap.xslCONF: |
Source: vmpcow.elf |
String found in binary or memory: http://pki.google.com/GIAG2.crl0 |
Source: vmpcow.elf |
String found in binary or memory: http://pki.google.com/GIAG2.crt0 |
Source: vmpcow.elf |
String found in binary or memory: https://github.com/robertdavidgraham/ |
Source: vmpcow.elf |
String found in binary or memory: https://github.com/robertdavidgraham/masscan |
Source: vmpcow.elf |
String found in binary or memory: https://github.com/robertdavidgraham/masscan) |
Source: vmpcow.elf |
String found in binary or memory: https://github.com/robertdavidgraham/masscanCONF: |
Source: vmpcow.elf |
String found in binary or memory: https://www.geotrust.com/resources/repository0 |
Source: vmpcow.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Portscan_a40c7ef0 Author: unknown |
Source: vmpcow.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Portscan_e191222d Author: unknown |
Source: vmpcow.elf, type: SAMPLE |
Matched rule: masscan is a performant port scanner, it produces results similar to nmap Author: @mimeframe |
Source: LOAD without section mappings |
Program segment: 0x400000 |
Source: Initial sample |
Potential command found: GET /version HTTP/1.1 |
Source: Initial sample |
Potential command found: GET / HTTP/1.0 |
Source: Initial sample |
Potential command found: GET / HTTP/1.1 |
Source: Initial sample |
Potential command found: GET / FOO |
Source: Initial sample |
Potential command found: GET / XXXXXXXXXXXX |
Source: Initial sample |
Potential command found: GET / HTTP/1.1 |
Source: Initial sample |
Potential command found: GET /foo.html |
Source: Initial sample |
Potential command found: GET /foo.html HTTP/1.0 |
Source: Initial sample |
Potential command found: GET /longerthan HTTP/1.0 |
Source: Initial sample |
Potential command found: GET /foo.html HTTP/1.0 |
Source: Initial sample |
Potential command found: GET /foo.htmlGET /foo.html HTTP/1.0 |
Source: Initial sample |
Potential command found: arp does not encapsulate another protocol |
Source: ELF static info symbol of initial sample |
.symtab present: no |
Source: vmpcow.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Portscan_a40c7ef0 reference_sample = c389c42bac5d4261dbca50c848f22c701df4c9a2c5877dc01e2eaa81300bdc29, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Portscan, fingerprint = bf686c3c313936a144265cbf75850c8aee3af3ae36cb571050c7fceed385451d, id = a40c7ef0-627c-4965-b4d3-b05b79586170, last_modified = 2021-09-16 |
Source: vmpcow.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Portscan_e191222d reference_sample = e2f4313538c3ef23adbfc50f37451c318bfd1ffd0e5aaa346cce4cc37417f812, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Portscan, fingerprint = 5580dd8b9180b8ff36c7d08a134b1b3782b41054d8b29b23fc5a79e7b0059fd1, id = e191222d-633a-4408-9a54-a70bb9e89cc0, last_modified = 2021-09-16 |
Source: vmpcow.elf, type: SAMPLE |
Matched rule: hacktool_multi_masscan author = @mimeframe, description = masscan is a performant port scanner, it produces results similar to nmap, reference = https://github.com/robertdavidgraham/masscan |
Source: classification engine |
Classification label: mal68.troj.linELF@0/0@0/0 |
Source: vmpcow.elf |
Binary or memory string: [hint] VMware on Macintosh doesn't support masscan |
Source: vmpcow.elf |
Binary or memory string: VMware |
Source: vmpcow.elf |
Binary or memory string: vmnet1 |
Source: vmpcow.elf |
Binary or memory string: subject[VMware ESX Server Default Certificate] |
Source: vmpcow.elf |
Binary or memory string: icmperrcwr-ece-urg-ack-psh-rst-syn-fin-CompulabAaeonICPelecVMwareSeagateSynologyAsusD-LinkAppleAzurewaveOdroidRPi 22-11SupermicroCiscoUbiquiti[random]AmazonRPi 22-02HPRPi 20-07Cisco-LinksysRPi 19-12ZyxelTrolinkBelkinRPi 19-03RPi 12-03CeLinkNetgearParrotunknown status type: %u |
Source: vmpcow.elf |
Binary or memory string: issuer[VMware Inc] |
Source: vmpcow.elf |
Binary or memory string: ---------------nasend~~]issuer[iPECS]issuer[McAfeeissuer[webmin]issuer[Webmin subject[HP-IPG]issuer[LaCie SA]subject[OpenWrt]issuer[Puppet CAissuer[Kasperskysubject[Fortinet]issuer[ICC-FW CA]issuer[HIKVISION]subject[SHARP MX-issuer[GANDI SAS]subject[FortiGate]issuer[watchguard]issuer[VMware Inc]issuer[eBox Server]subject[WatchGuard]issuer[RapidSSL CA]issuer[AddTrust AB]issuer[Cisco SSCA2]subject[Cisco SSCA2]issuer[v] issuer[v]issuer[Register.com]issuer[Thawte, Inc.]issuer[thawte, Inc.]issuer[EQ-MT-RAPTOR]issuer[DigiCert Inc]issuer[TERENA SSL CA]issuer[WatchGuard CA]issuer[OpenVPN Web CAissuer[GeoTrust Inc.]issuer[TS Series NAS]subject[Polycom Inc.]issuer[Fortinet Ltd.]issuer[Synology Inc.]issuer[XX] issuer[XX]2Wire]Gateway Device]subject[DigiCert Inc]issuer[SamsungTechwin]issuer[TAIWAN-CA INC.]issuer[GeoTrust, Inc.]issuer[ValiCert, Inc.]issuer[Apache Friends]issuer[VeriSign, Inc.]issuer[Cybertrust Inc]subject[HiTRON SYSTEMS]issuer[SonicWALL, Inc.]issuer[Future Systems.]issuer[Polycom Root CA]issuer[AlphaSSL CA - G2]issuer[GlobalSign nv-sa]SonicWALL, Inc.]SSL-VPN]issuer[Comodo CA Limited]issuer[COMODO CA Limited]issuer[GoDaddy.com, Inc.]subject[Barracuda Networks]issuer[Equifax Secure Inc.]issuer[Gandi Standard SSL CA]issuer[The USERTRUST Network]subject[Polycom] subject[VSG]issuer[EuropeanSSL Server CA]issuer[SuSE Linux Web Server]issuer[CradlePoint Technology]SonicWALL]Secure Remote Access]subject[SomeOrganizationalUnit]issuer[Internet Widgits Pty Ltd]issuer[Network Solutions L.L.C.]issuer[The Go Daddy Group, Inc.]issuer[Nepenthes Development Team]issuer[WoSign Class 1 DV Server CA]issuer[Polycom Equipment Policy CA]issuer[Starfield Technologies, Inc.]issuer[Certum Certification Authority]subject[Fujitsu CELVIN(R) NAS Server]SonicWALL, Inc.]Secure Remote Access]issuer[Secure Digital Certificate Signing]issuer[Equifax Secure Certificate Authority]subject[VMware ESX Server Default Certificate]issuer[Cisco Systems] issuer[Cisco Manufacturing CA]truefalseoffline = %s |
Source: vmpcow.elf |
Binary or memory string: %s: ftell failed (file system error? seen with VMware HGFS bug) |
Source: vmpcow.elf |
Binary or memory string: if: datalinkvmnet1\Device\NPF_[-] if = not found (err=%d) |
Source: vmpcow.elf |
String found in binary or memory: RFB 000.000 |
Source: vmpcow.elf |
String found in binary or memory: RFB 003.003 |
Source: vmpcow.elf |
String found in binary or memory: RFB 003.005 |
Source: vmpcow.elf |
String found in binary or memory: RFB 003.006 |
Source: vmpcow.elf |
String found in binary or memory: RFB 003.007 |
Source: vmpcow.elf |
String found in binary or memory: RFB 003.008 |
Source: vmpcow.elf |
String found in binary or memory: RFB 003.889 |
Source: vmpcow.elf |
String found in binary or memory: RFB 003.009 |
Source: vmpcow.elf |
String found in binary or memory: RFB 004.000 |
Source: vmpcow.elf |
String found in binary or memory: RFB 004.001 |
Source: vmpcow.elf |
String found in binary or memory: RFB 004.002 |