Source: own.elf |
Virustotal: Detection: 40% |
Perma Link |
Source: global traffic |
DNS traffic detected: DNS query: daisy.ubuntu.com |
Source: own.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Flooder_a2795a4c Author: unknown |
Source: own.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Flooder_4bcea1c4 Author: unknown |
Source: 5569.1.0000000000400000.0000000000402000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Hacktool_Flooder_a2795a4c Author: unknown |
Source: 5569.1.0000000000400000.0000000000402000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Hacktool_Flooder_4bcea1c4 Author: unknown |
Source: own.elf |
ELF static info symbol of initial sample: PAYLOAD |
Source: own.elf |
ELF static info symbol of initial sample: PAYLOADSIZE |
Source: own.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Flooder_a2795a4c reference_sample = 9a564d6b29d2aaff960e6f84cd0ef4c701fefa2a62e2ea690106f3fdbabb0d71, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Flooder, fingerprint = 7c8bf248b159f3a140f10cd40d182fa84f334555b92306e6f44e746711b184cc, id = a2795a4c-16c0-4237-a014-3570d1edb287, last_modified = 2021-09-16 |
Source: own.elf, type: SAMPLE |
Matched rule: Linux_Hacktool_Flooder_4bcea1c4 reference_sample = 9a564d6b29d2aaff960e6f84cd0ef4c701fefa2a62e2ea690106f3fdbabb0d71, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Flooder, fingerprint = e859966e8281e024c82dedd5bd237ab53af28a0cb21d24daa456e5cd1186c352, id = 4bcea1c4-de08-4526-8d31-89c5512f07af, last_modified = 2021-09-16 |
Source: 5569.1.0000000000400000.0000000000402000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Hacktool_Flooder_a2795a4c reference_sample = 9a564d6b29d2aaff960e6f84cd0ef4c701fefa2a62e2ea690106f3fdbabb0d71, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Flooder, fingerprint = 7c8bf248b159f3a140f10cd40d182fa84f334555b92306e6f44e746711b184cc, id = a2795a4c-16c0-4237-a014-3570d1edb287, last_modified = 2021-09-16 |
Source: 5569.1.0000000000400000.0000000000402000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Hacktool_Flooder_4bcea1c4 reference_sample = 9a564d6b29d2aaff960e6f84cd0ef4c701fefa2a62e2ea690106f3fdbabb0d71, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Flooder, fingerprint = e859966e8281e024c82dedd5bd237ab53af28a0cb21d24daa456e5cd1186c352, id = 4bcea1c4-de08-4526-8d31-89c5512f07af, last_modified = 2021-09-16 |
Source: classification engine |
Classification label: mal60.linELF@0/0@2/0 |
Source: ELF symbol in initial sample |
Symbol name: usleep |