Linux Analysis Report
yakuza.m68k.elf

Overview

General Information

Sample name: yakuza.m68k.elf
Analysis ID: 1561399
MD5: 6f29cf16208a5a65d64fc40d9f161210
SHA1: 19642cf4cb5e7df090d2268d5e89f87c8df4baa9
SHA256: 5e6e4b917fdd5275e837fe3440fbb1b1bcb48dc4564f66dea69bdb43e4820f65
Tags: elfuser-abuse_ch
Infos:

Detection

Mirai
Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Uses IRC for communication with a C&C
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "kill" or "pkill" command typically used to terminate processes
Reads CPU information from /sys indicative of miner or evasive malware
Sample and/or dropped files contains symbols with suspicious names
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings indicative of password brute-forcing capabilities
Sample contains strings that are user agent strings indicative of HTTP manipulation
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Mirai Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai

AV Detection

barindex
Source: yakuza.m68k.elf ReversingLabs: Detection: 57%
Source: /usr/bin/pkill (PID: 6275) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6284) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6289) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6295) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6299) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6305) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6309) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6319) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6348) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6354) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6362) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6368) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6375) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6381) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6385) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6394) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6400) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6404) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6410) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6417) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6423) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6432) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6438) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6442) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6450) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6456) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6460) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6466) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6475) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6484) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6488) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6497) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6503) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6512) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6520) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6530) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6537) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6544) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6553) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6560) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6566) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6576) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6585) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6592) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6601) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6608) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6615) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6621) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6631) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6640) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6647) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6653) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6660) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6666) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6673) Reads CPU info from /sys: /sys/devices/system/cpu/online

Networking

barindex
Source: unknown IRC traffic detected: 192.168.2.23:38752 -> 95.234.158.87:6780 NICK [OSX|M68K]PaIepvQ USER PaIepvQ localhost localhost :PaIepvQ
Source: unknown Network traffic detected: IRC traffic on port 38752 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38754 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38756 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38758 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38760 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38762 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38764 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38766 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38768 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38770 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38772 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38774 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38776 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38778 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38780 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38782 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38784 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38784 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38784 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38786 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38788 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38790 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38792 -> 6780
Source: global traffic TCP traffic: 192.168.2.23:38752 -> 95.234.158.87:6780
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: unknown TCP traffic detected without corresponding DNS query: 95.234.158.87
Source: yakuza.m68k.elf String found in binary or memory: http://linux-it.abuser.eu/yak.sh;
Source: yakuza.m68k.elf String found in binary or memory: https://youtu.be/dQw4w9WgXcQ
Source: yakuza.m68k.elf String found in binary or memory: https://youtu.be/dQw4w9WgXcQNever
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: yakuza.m68k.elf, type: SAMPLE Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: 6261.1.00007f14ac001000.00007f14ac01e000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: Process Memory Space: yakuza.m68k.elf PID: 6261, type: MEMORYSTR Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: yakuza.m68k.elf ELF static info symbol of initial sample: passwords
Source: yakuza.m68k.elf ELF static info symbol of initial sample: usernames
Source: Initial sample String containing 'busybox' found: busybox
Source: Initial sample String containing 'busybox' found: pkill -9 %s || busybox pkill -9 %s
Source: Initial sample String containing 'busybox' found: pkill -9 %s || busybox pkill -9 %shistory -c;history -wcd /root;rm -f .bash_historycd /var/tmp; rm -f *NOTICE %s :MOVE <server>
Source: Initial sample String containing potential weak password found: guest
Source: Initial sample String containing potential weak password found: default
Source: Initial sample String containing potential weak password found: admin
Source: Initial sample String containing potential weak password found: supervisor
Source: Initial sample String containing potential weak password found: service
Source: Initial sample String containing potential weak password found: administrator
Source: Initial sample String containing potential weak password found: support
Source: Initial sample String containing potential weak password found: 123456
Source: Initial sample String containing potential weak password found: password
Source: Initial sample String containing potential weak password found: 12345
Source: yakuza.m68k.elf, type: SAMPLE Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: 6261.1.00007f14ac001000.00007f14ac01e000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: Process Memory Space: yakuza.m68k.elf PID: 6261, type: MEMORYSTR Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: classification engine Classification label: mal72.troj.linELF@0/0@0/0
Source: yakuza.m68k.elf ELF static info symbol of initial sample: libc/sysdeps/linux/m68k/crt1.S
Source: yakuza.m68k.elf ELF static info symbol of initial sample: libc/sysdeps/linux/m68k/crti.S
Source: yakuza.m68k.elf ELF static info symbol of initial sample: libc/sysdeps/linux/m68k/crtn.S
Source: yakuza.m68k.elf ELF static info symbol of initial sample: libc/sysdeps/linux/m68k/vfork.S
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1582/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1582/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/3088/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/3088/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/230/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/230/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/110/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/110/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/231/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/231/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/111/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/111/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/232/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/232/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1579/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1579/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/112/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/112/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/233/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/233/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1699/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1699/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/113/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/113/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/234/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/234/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1335/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1335/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1698/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1698/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/114/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/114/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/235/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/235/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1334/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1334/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1576/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1576/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/2302/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/2302/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/115/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/115/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/236/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/236/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/116/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/116/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/237/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/237/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/117/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/117/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/118/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/118/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/910/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/910/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/119/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/119/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/912/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/912/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/10/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/10/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/2307/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/2307/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/11/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/11/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/918/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/918/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/12/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/12/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/13/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/13/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/14/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/14/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/15/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/15/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/6245/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/6245/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/16/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/16/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/17/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/17/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/18/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/18/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/6246/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/6246/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1594/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1594/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/120/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/120/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/121/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/121/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1349/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1349/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/1/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/122/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/122/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/243/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/243/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/123/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/123/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/2/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/2/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/124/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/124/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/3/status Jump to behavior
Source: /usr/bin/pkill (PID: 6394) File opened: /proc/3/cmdline Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6272) Shell command executed: sh -c "pkill -9 902i13 || busybox pkill -9 902i13" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6279) Shell command executed: sh -c "pkill -9 BzSxLxBxeY || busybox pkill -9 BzSxLxBxeY" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6287) Shell command executed: sh -c "pkill -9 HOHO-LUGO7 || busybox pkill -9 HOHO-LUGO7" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6293) Shell command executed: sh -c "pkill -9 HOHO-U79OL || busybox pkill -9 HOHO-U79OL" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6297) Shell command executed: sh -c "pkill -9 JuYfouyf87 || busybox pkill -9 JuYfouyf87" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6303) Shell command executed: sh -c "pkill -9 NiGGeR69xd || busybox pkill -9 NiGGeR69xd" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6307) Shell command executed: sh -c "pkill -9 SO190Ij1X || busybox pkill -9 SO190Ij1X" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6313) Shell command executed: sh -c "pkill -9 LOLKIKEEEDDE || busybox pkill -9 LOLKIKEEEDDE" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6343) Shell command executed: sh -c "pkill -9 ekjheory98e || busybox pkill -9 ekjheory98e" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6352) Shell command executed: sh -c "pkill -9 scansh4 || busybox pkill -9 scansh4" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6356) Shell command executed: sh -c "pkill -9 MDMA || busybox pkill -9 MDMA" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6366) Shell command executed: sh -c "pkill -9 fdevalvex || busybox pkill -9 fdevalvex" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6370) Shell command executed: sh -c "pkill -9 scanspc || busybox pkill -9 scanspc" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6379) Shell command executed: sh -c "pkill -9 MELTEDNINJAREALZ || busybox pkill -9 MELTEDNINJAREALZ" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6383) Shell command executed: sh -c "pkill -9 flexsonskids || busybox pkill -9 flexsonskids" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6388) Shell command executed: sh -c "pkill -9 scanx86 || busybox pkill -9 scanx86" Jump to behavior
Source: /tmp/yakuza.m68k.elf (PID: 6398) Shell command executed: sh -c "pkill -9 MISAKI-U79OL || busybox pkill -9 MISAKI-U79OL"
Source: /tmp/yakuza.m68k.elf (PID: 6402) Shell command executed: sh -c "pkill -9 foAxi102kxe || busybox pkill -9 foAxi102kxe"
Source: /tmp/yakuza.m68k.elf (PID: 6408) Shell command executed: sh -c "pkill -9 swodjwodjwoj || busybox pkill -9 swodjwodjwoj"
Source: /tmp/yakuza.m68k.elf (PID: 6412) Shell command executed: sh -c "pkill -9 MmKiy7f87l || busybox pkill -9 MmKiy7f87l"
Source: /tmp/yakuza.m68k.elf (PID: 6421) Shell command executed: sh -c "pkill -9 freecookiex86 || busybox pkill -9 freecookiex86"
Source: /tmp/yakuza.m68k.elf (PID: 6427) Shell command executed: sh -c "pkill -9 sysgpu || busybox pkill -9 sysgpu"
Source: /tmp/yakuza.m68k.elf (PID: 6436) Shell command executed: sh -c "pkill -9 NiGGeR69xd || busybox pkill -9 NiGGeR69xd"
Source: /tmp/yakuza.m68k.elf (PID: 6440) Shell command executed: sh -c "pkill -9 frgege || busybox pkill -9 frgege"
Source: /tmp/yakuza.m68k.elf (PID: 6444) Shell command executed: sh -c "pkill -9 sysupdater || busybox pkill -9 sysupdater"
Source: /tmp/yakuza.m68k.elf (PID: 6454) Shell command executed: sh -c "pkill -9 0DnAzepd || busybox pkill -9 0DnAzepd"
Source: /tmp/yakuza.m68k.elf (PID: 6458) Shell command executed: sh -c "pkill -9 NiGGeRD0nks69 || busybox pkill -9 NiGGeRD0nks69"
Source: /tmp/yakuza.m68k.elf (PID: 6464) Shell command executed: sh -c "pkill -9 frgreu || busybox pkill -9 frgreu"
Source: /tmp/yakuza.m68k.elf (PID: 6469) Shell command executed: sh -c "pkill -9 telnetd || busybox pkill -9 telnetd"
Source: /tmp/yakuza.m68k.elf (PID: 6479) Shell command executed: sh -c "pkill -9 0x766f6964 || busybox pkill -9 0x766f6964"
Source: /tmp/yakuza.m68k.elf (PID: 6486) Shell command executed: sh -c "pkill -9 NiGGeRd0nks1337 || busybox pkill -9 NiGGeRd0nks1337"
Source: /tmp/yakuza.m68k.elf (PID: 6492) Shell command executed: sh -c "pkill -9 gaft || busybox pkill -9 gaft"
Source: /tmp/yakuza.m68k.elf (PID: 6499) Shell command executed: sh -c "pkill -9 urasgbsigboa || busybox pkill -9 urasgbsigboa"
Source: /tmp/yakuza.m68k.elf (PID: 6508) Shell command executed: sh -c "pkill -9 120i3UI49 || busybox pkill -9 120i3UI49"
Source: /tmp/yakuza.m68k.elf (PID: 6515) Shell command executed: sh -c "pkill -9 OaF3 || busybox pkill -9 OaF3"
Source: /tmp/yakuza.m68k.elf (PID: 6524) Shell command executed: sh -c "pkill -9 geae || busybox pkill -9 geae"
Source: /tmp/yakuza.m68k.elf (PID: 6532) Shell command executed: sh -c "pkill -9 vaiolmao || busybox pkill -9 vaiolmao"
Source: /tmp/yakuza.m68k.elf (PID: 6539) Shell command executed: sh -c "pkill -9 123123a || busybox pkill -9 123123a"
Source: /tmp/yakuza.m68k.elf (PID: 6548) Shell command executed: sh -c "pkill -9 Ofurain0n4H34D || busybox pkill -9 Ofurain0n4H34D"
Source: /tmp/yakuza.m68k.elf (PID: 6555) Shell command executed: sh -c "pkill -9 ggTrex || busybox pkill -9 ggTrex"
Source: /tmp/yakuza.m68k.elf (PID: 6564) Shell command executed: sh -c "pkill -9 wasads || busybox pkill -9 wasads"
Source: /tmp/yakuza.m68k.elf (PID: 6570) Shell command executed: sh -c "pkill -9 1293194hjXD || busybox pkill -9 1293194hjXD"
Source: /tmp/yakuza.m68k.elf (PID: 6580) Shell command executed: sh -c "pkill -9 OthLaLosn || busybox pkill -9 OthLaLosn"
Source: /tmp/yakuza.m68k.elf (PID: 6587) Shell command executed: sh -c "pkill -9 ggt || busybox pkill -9 ggt"
Source: /tmp/yakuza.m68k.elf (PID: 6596) Shell command executed: sh -c "pkill -9 wget-log || busybox pkill -9 wget-log"
Source: /tmp/yakuza.m68k.elf (PID: 6603) Shell command executed: sh -c "pkill -9 1337SoraLOADER || busybox pkill -9 1337SoraLOADER"
Source: /tmp/yakuza.m68k.elf (PID: 6610) Shell command executed: sh -c "pkill -9 SAIAKINA || busybox pkill -9 SAIAKINA"
Source: /tmp/yakuza.m68k.elf (PID: 6619) Shell command executed: sh -c "pkill -9 ggtq || busybox pkill -9 ggtq"
Source: /tmp/yakuza.m68k.elf (PID: 6625) Shell command executed: sh -c "pkill -9 1378bfp919GRB1Q2 || busybox pkill -9 1378bfp919GRB1Q2"
Source: /tmp/yakuza.m68k.elf (PID: 6635) Shell command executed: sh -c "pkill -9 SAIAKUSO || busybox pkill -9 SAIAKUSO"
Source: /tmp/yakuza.m68k.elf (PID: 6642) Shell command executed: sh -c "pkill -9 ggtr || busybox pkill -9 ggtr"
Source: /tmp/yakuza.m68k.elf (PID: 6651) Shell command executed: sh -c "pkill -9 14Fa || busybox pkill -9 14Fa"
Source: /tmp/yakuza.m68k.elf (PID: 6655) Shell command executed: sh -c "pkill -9 SEXSLAVE1337 || busybox pkill -9 SEXSLAVE1337"
Source: /tmp/yakuza.m68k.elf (PID: 6664) Shell command executed: sh -c "pkill -9 ggtt || busybox pkill -9 ggtt"
Source: /tmp/yakuza.m68k.elf (PID: 6668) Shell command executed: sh -c "pkill -9 1902a3u912u3u4 || busybox pkill -9 1902a3u912u3u4"
Source: /bin/sh (PID: 6275) Pkill executable: /usr/bin/pkill -> pkill -9 902i13 Jump to behavior
Source: /bin/sh (PID: 6284) Pkill executable: /usr/bin/pkill -> pkill -9 BzSxLxBxeY Jump to behavior
Source: /bin/sh (PID: 6289) Pkill executable: /usr/bin/pkill -> pkill -9 HOHO-LUGO7 Jump to behavior
Source: /bin/sh (PID: 6295) Pkill executable: /usr/bin/pkill -> pkill -9 HOHO-U79OL Jump to behavior
Source: /bin/sh (PID: 6299) Pkill executable: /usr/bin/pkill -> pkill -9 JuYfouyf87 Jump to behavior
Source: /bin/sh (PID: 6305) Pkill executable: /usr/bin/pkill -> pkill -9 NiGGeR69xd Jump to behavior
Source: /bin/sh (PID: 6309) Pkill executable: /usr/bin/pkill -> pkill -9 SO190Ij1X Jump to behavior
Source: /bin/sh (PID: 6319) Pkill executable: /usr/bin/pkill -> pkill -9 LOLKIKEEEDDE Jump to behavior
Source: /bin/sh (PID: 6348) Pkill executable: /usr/bin/pkill -> pkill -9 ekjheory98e Jump to behavior
Source: /bin/sh (PID: 6354) Pkill executable: /usr/bin/pkill -> pkill -9 scansh4 Jump to behavior
Source: /bin/sh (PID: 6362) Pkill executable: /usr/bin/pkill -> pkill -9 MDMA Jump to behavior
Source: /bin/sh (PID: 6368) Pkill executable: /usr/bin/pkill -> pkill -9 fdevalvex Jump to behavior
Source: /bin/sh (PID: 6375) Pkill executable: /usr/bin/pkill -> pkill -9 scanspc Jump to behavior
Source: /bin/sh (PID: 6381) Pkill executable: /usr/bin/pkill -> pkill -9 MELTEDNINJAREALZ Jump to behavior
Source: /bin/sh (PID: 6385) Pkill executable: /usr/bin/pkill -> pkill -9 flexsonskids Jump to behavior
Source: /bin/sh (PID: 6394) Pkill executable: /usr/bin/pkill -> pkill -9 scanx86 Jump to behavior
Source: /bin/sh (PID: 6400) Pkill executable: /usr/bin/pkill -> pkill -9 MISAKI-U79OL
Source: /bin/sh (PID: 6404) Pkill executable: /usr/bin/pkill -> pkill -9 foAxi102kxe
Source: /bin/sh (PID: 6410) Pkill executable: /usr/bin/pkill -> pkill -9 swodjwodjwoj
Source: /bin/sh (PID: 6417) Pkill executable: /usr/bin/pkill -> pkill -9 MmKiy7f87l
Source: /bin/sh (PID: 6423) Pkill executable: /usr/bin/pkill -> pkill -9 freecookiex86
Source: /bin/sh (PID: 6432) Pkill executable: /usr/bin/pkill -> pkill -9 sysgpu
Source: /bin/sh (PID: 6438) Pkill executable: /usr/bin/pkill -> pkill -9 NiGGeR69xd
Source: /bin/sh (PID: 6442) Pkill executable: /usr/bin/pkill -> pkill -9 frgege
Source: /bin/sh (PID: 6450) Pkill executable: /usr/bin/pkill -> pkill -9 sysupdater
Source: /bin/sh (PID: 6456) Pkill executable: /usr/bin/pkill -> pkill -9 0DnAzepd
Source: /bin/sh (PID: 6460) Pkill executable: /usr/bin/pkill -> pkill -9 NiGGeRD0nks69
Source: /bin/sh (PID: 6466) Pkill executable: /usr/bin/pkill -> pkill -9 frgreu
Source: /bin/sh (PID: 6475) Pkill executable: /usr/bin/pkill -> pkill -9 telnetd
Source: /bin/sh (PID: 6484) Pkill executable: /usr/bin/pkill -> pkill -9 0x766f6964
Source: /bin/sh (PID: 6488) Pkill executable: /usr/bin/pkill -> pkill -9 NiGGeRd0nks1337
Source: /bin/sh (PID: 6497) Pkill executable: /usr/bin/pkill -> pkill -9 gaft
Source: /bin/sh (PID: 6503) Pkill executable: /usr/bin/pkill -> pkill -9 urasgbsigboa
Source: /bin/sh (PID: 6512) Pkill executable: /usr/bin/pkill -> pkill -9 120i3UI49
Source: /bin/sh (PID: 6520) Pkill executable: /usr/bin/pkill -> pkill -9 OaF3
Source: /bin/sh (PID: 6530) Pkill executable: /usr/bin/pkill -> pkill -9 geae
Source: /bin/sh (PID: 6537) Pkill executable: /usr/bin/pkill -> pkill -9 vaiolmao
Source: /bin/sh (PID: 6544) Pkill executable: /usr/bin/pkill -> pkill -9 123123a
Source: /bin/sh (PID: 6553) Pkill executable: /usr/bin/pkill -> pkill -9 Ofurain0n4H34D
Source: /bin/sh (PID: 6560) Pkill executable: /usr/bin/pkill -> pkill -9 ggTrex
Source: /bin/sh (PID: 6566) Pkill executable: /usr/bin/pkill -> pkill -9 wasads
Source: /bin/sh (PID: 6576) Pkill executable: /usr/bin/pkill -> pkill -9 1293194hjXD
Source: /bin/sh (PID: 6585) Pkill executable: /usr/bin/pkill -> pkill -9 OthLaLosn
Source: /bin/sh (PID: 6592) Pkill executable: /usr/bin/pkill -> pkill -9 ggt
Source: /bin/sh (PID: 6601) Pkill executable: /usr/bin/pkill -> pkill -9 wget-log
Source: /bin/sh (PID: 6608) Pkill executable: /usr/bin/pkill -> pkill -9 1337SoraLOADER
Source: /bin/sh (PID: 6615) Pkill executable: /usr/bin/pkill -> pkill -9 SAIAKINA
Source: /bin/sh (PID: 6621) Pkill executable: /usr/bin/pkill -> pkill -9 ggtq
Source: /bin/sh (PID: 6631) Pkill executable: /usr/bin/pkill -> pkill -9 1378bfp919GRB1Q2
Source: /bin/sh (PID: 6640) Pkill executable: /usr/bin/pkill -> pkill -9 SAIAKUSO
Source: /bin/sh (PID: 6647) Pkill executable: /usr/bin/pkill -> pkill -9 ggtr
Source: /bin/sh (PID: 6653) Pkill executable: /usr/bin/pkill -> pkill -9 14Fa
Source: /bin/sh (PID: 6660) Pkill executable: /usr/bin/pkill -> pkill -9 SEXSLAVE1337
Source: /bin/sh (PID: 6666) Pkill executable: /usr/bin/pkill -> pkill -9 ggtt
Source: /bin/sh (PID: 6673) Pkill executable: /usr/bin/pkill -> pkill -9 1902a3u912u3u4

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: IRC traffic on port 38752 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38754 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38756 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38758 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38760 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38762 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38764 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38766 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38768 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38770 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38772 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38774 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38776 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38778 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38780 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38782 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38784 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38784 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38784 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38786 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38788 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38790 -> 6780
Source: unknown Network traffic detected: IRC traffic on port 38792 -> 6780
Source: /usr/bin/pkill (PID: 6275) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6284) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6289) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6295) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6299) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6305) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6309) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6319) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6348) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6354) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6362) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6368) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6375) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6381) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6385) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6394) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6400) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6404) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6410) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6417) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6423) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6432) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6438) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6442) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6450) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6456) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6460) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6466) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6475) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6484) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6488) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6497) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6503) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6512) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6520) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6530) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6537) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6544) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6553) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6560) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6566) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6576) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6585) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6592) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6601) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6608) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6615) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6621) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6631) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6640) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6647) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6653) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6660) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6666) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6673) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /tmp/yakuza.m68k.elf (PID: 6261) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6276) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6285) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6292) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6296) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6300) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6306) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6310) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6320) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6349) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6355) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6363) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6369) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6376) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6382) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6387) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 6397) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6401) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6407) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6411) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6418) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6424) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6433) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6439) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6443) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6453) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6457) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6463) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6467) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6478) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6485) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6489) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6498) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6505) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6514) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6521) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6531) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6538) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6547) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6554) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6563) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6568) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6577) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6586) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6593) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6602) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6609) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6618) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6624) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6632) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6641) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6648) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6654) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6661) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 6667) Queries kernel information via 'uname':
Source: yakuza.m68k.elf, 6261.1.00007ffc08b87000.00007ffc08ba8000.rw-.sdmp Binary or memory string: Hx86_64/usr/bin/qemu-m68k/tmp/yakuza.m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/yakuza.m68k.elf
Source: yakuza.m68k.elf, 6261.1.000055dab594f000.000055dab59b3000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/m68k
Source: yakuza.m68k.elf, 6261.1.00007ffc08b87000.00007ffc08ba8000.rw-.sdmp Binary or memory string: /usr/bin/qemu-m68k
Source: yakuza.m68k.elf, 6261.1.000055dab594f000.000055dab59b3000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/m68k

Stealing of Sensitive Information

barindex
Source: Yara match File source: yakuza.m68k.elf, type: SAMPLE
Source: Yara match File source: 6261.1.00007f14ac001000.00007f14ac01e000.r-x.sdmp, type: MEMORY
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:48.0) Gecko/20100101 Firefox/48.0
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; U; Intel Mac OS X; en; rv:1.8.1.11) Gecko/20071128 Camino/1.5.4
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Windows NT 6.1; rv:2.2) Gecko/20110201
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Windows NT 6.1; cs; rv:1.9.2.6) Gecko/20100628 myibrow/4alpha2
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Win 9x 4.90; SG; rv:1.9.2.4) Gecko/20101104 Netscape/9.1.0285
Source: Initial sample User agent string found: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0 Lightning/4.0.2
Source: Initial sample User agent string found: Opera/9.80 (X11; Linux i686; Ubuntu/14.10) Presto/2.12.388 Version/12.16
Source: Initial sample User agent string found: Opera/9.80 (Windows NT 5.1; U;) Presto/2.7.62 Version/11.01
Source: Initial sample User agent string found: Mozilla/5.0 (X11; Linux x86_64; U; de; rv:1.9.1.6) Gecko/20091201 Firefox/3.5.6 Opera 10.62
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Linux; Android 4.4.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.89 Mobile Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:5.0) Gecko/20110517 Firefox/5.0 Fennec/5.0
Source: Initial sample User agent string found: Mozilla/5.0 (Android; Linux armv7l; rv:9.0) Gecko/20111216 Firefox/9.0 Fennec/9.0
Source: Initial sample User agent string found: Mozilla/5.0 (compatible; Teleca Q7; Brew 3.1.5; U; en) 480X800 LGE VX11000

Remote Access Functionality

barindex
Source: Yara match File source: yakuza.m68k.elf, type: SAMPLE
Source: Yara match File source: 6261.1.00007f14ac001000.00007f14ac01e000.r-x.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs