Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 31.172.83.147 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown | TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown | TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: boatnet.sh4.elf, type: SAMPLE | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: boatnet.sh4.elf, type: SAMPLE | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6215.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6215.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6217.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6217.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6211.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6211.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: boatnet.sh4.elf PID: 6215, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: boatnet.sh4.elf PID: 6215, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: boatnet.sh4.elf PID: 6217, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: boatnet.sh4.elf PID: 6217, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2018, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2077, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2078, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2079, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2080, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2083, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2084, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2114, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2156, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6217, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6223, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6224, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6225, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6226, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6227, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6228, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2018, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2077, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2078, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2079, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2080, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2083, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2084, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2114, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 2156, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6217, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6223, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6224, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6225, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6226, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6227, result: successful | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | SIGKILL sent: pid: 6228, result: successful | Jump to behavior |
Source: boatnet.sh4.elf, type: SAMPLE | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: boatnet.sh4.elf, type: SAMPLE | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6215.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6215.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6217.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6217.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6211.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6211.1.00007f2924400000.00007f292440c000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.sh4.elf PID: 6215, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.sh4.elf PID: 6215, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.sh4.elf PID: 6217, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.sh4.elf PID: 6217, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/4333/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1582/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2033/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2275/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/3088/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6195/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6194/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1612/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1579/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1699/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1335/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1698/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2028/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1334/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1576/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2302/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/3236/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2025/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2146/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/910/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/4444/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6227/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/4445/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6226/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/912/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/517/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/759/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6228/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2307/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/918/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6241/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6240/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6243/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6242/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6245/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6244/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6247/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6246/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1594/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2285/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2281/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1349/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1623/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/761/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1622/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/884/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1983/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2038/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1344/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1465/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1586/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1463/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2156/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/800/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6238/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/801/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1629/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6239/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1627/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1900/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6252/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6251/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6254/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6253/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/3021/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/491/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2294/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2050/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6250/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1877/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/772/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1633/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1599/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1632/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/774/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1477/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/654/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/896/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1476/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1872/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2048/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/655/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1475/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2289/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/656/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/777/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/657/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/4466/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6249/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/658/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/6248/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/419/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/936/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1639/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1638/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2208/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2180/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1809/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1494/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1890/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2063/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/2062/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1888/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/1886/cmdline | Jump to behavior |
Source: /tmp/boatnet.sh4.elf (PID: 6213) | File opened: /proc/420/cmdline | Jump to behavior |
Source: boatnet.sh4.elf, 6211.1.00007ffeff073000.00007ffeff094000.rw-.sdmp, boatnet.sh4.elf, 6215.1.00007ffeff073000.00007ffeff094000.rw-.sdmp, boatnet.sh4.elf, 6217.1.00007ffeff073000.00007ffeff094000.rw-.sdmp | Binary or memory string: x86_64/usr/bin/qemu-sh4/tmp/boatnet.sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/boatnet.sh4.elf |
Source: boatnet.sh4.elf, 6211.1.00007ffeff073000.00007ffeff094000.rw-.sdmp, boatnet.sh4.elf, 6215.1.00007ffeff073000.00007ffeff094000.rw-.sdmp, boatnet.sh4.elf, 6217.1.00007ffeff073000.00007ffeff094000.rw-.sdmp | Binary or memory string: /usr/bin/qemu-sh4 |
Source: boatnet.sh4.elf, 6211.1.0000561688de3000.0000561688e46000.rw-.sdmp, boatnet.sh4.elf, 6215.1.0000561688de3000.0000561688e46000.rw-.sdmp, boatnet.sh4.elf, 6217.1.0000561688de3000.0000561688e46000.rw-.sdmp | Binary or memory string: /etc/qemu-binfmt/sh4 |
Source: boatnet.sh4.elf, 6211.1.0000561688de3000.0000561688e46000.rw-.sdmp, boatnet.sh4.elf, 6215.1.0000561688de3000.0000561688e46000.rw-.sdmp, boatnet.sh4.elf, 6217.1.0000561688de3000.0000561688e46000.rw-.sdmp | Binary or memory string: V5!/etc/qemu-binfmt/sh4 |