Source: udp.elf |
Virustotal: Detection: 26% |
Perma Link |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 34.249.145.219 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
Network traffic detected: HTTP traffic on port 43928 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 39256 |
Source: unknown |
Network traffic detected: HTTP traffic on port 39256 -> 443 |
Source: udp.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Flooder_e63396f4 Author: unknown |
Source: 6262.1.00005649ccaea000.00005649ccaec000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Hacktool_Flooder_e63396f4 Author: unknown |
Source: udp.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Flooder_e63396f4 reference_sample = 913e6d2538bd7eed3a8f3d958cf445fe11c5c299a70e5385e0df6a9b2f638323, os = linux, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Flooder, fingerprint = 269285d03ea1a3b41ff134ab2cf5e22502626c72401b83add6c1e165f4dd83f8, id = e63396f4-a297-4d99-b341-34cb22498078, last_modified = 2021-09-16 |
Source: 6262.1.00005649ccaea000.00005649ccaec000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Hacktool_Flooder_e63396f4 reference_sample = 913e6d2538bd7eed3a8f3d958cf445fe11c5c299a70e5385e0df6a9b2f638323, os = linux, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Flooder, fingerprint = 269285d03ea1a3b41ff134ab2cf5e22502626c72401b83add6c1e165f4dd83f8, id = e63396f4-a297-4d99-b341-34cb22498078, last_modified = 2021-09-16 |
Source: classification engine |
Classification label: mal60.linELF@0/0@0/0 |
Source: /usr/bin/dash (PID: 6270) |
Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.He5K7IV2y1 /tmp/tmp.URZoQsaV7E /tmp/tmp.A8VPLso2Bh |
Jump to behavior |
Source: /usr/bin/dash (PID: 6271) |
Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.He5K7IV2y1 /tmp/tmp.URZoQsaV7E /tmp/tmp.A8VPLso2Bh |
Jump to behavior |