Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
x86_64.elf

Overview

General Information

Sample name:x86_64.elf
Analysis ID:1582725
MD5:7e7790f790a915208f7519ad92682dda
SHA1:40b7e5dc0b11b799deeaa89b7265c1b8d6c44d3d
SHA256:829f93ee611bb41c9a3b1d9243fdbf54a13e9ac50b5333abd84b3305713b2f7a
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Machine Learning detection for sample
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1582725
Start date and time:2024-12-31 10:55:43 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86_64.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@1/0
Command:/tmp/x86_64.elf
PID:5650
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • x86_64.elf (PID: 5650, Parent: 5579, MD5: 7e7790f790a915208f7519ad92682dda) Arguments: /tmp/x86_64.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
x86_64.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    x86_64.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      x86_64.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xb828:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb83c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb850:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb864:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb878:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb904:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb918:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb92c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb940:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb954:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb968:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb97c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb990:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0x7f48:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0x8737:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      5654.1.0000000000400000.000000000040e000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5654.1.0000000000400000.000000000040e000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5654.1.0000000000400000.000000000040e000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xb828:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb83c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb850:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb864:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb878:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb904:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb918:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb92c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb940:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb954:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb968:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb97c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb990:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb9a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb9b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5654.1.0000000000400000.000000000040e000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
          • 0x7f48:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
          5654.1.0000000000400000.000000000040e000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
          • 0x8737:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
          Click to see the 27 entries
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-31T10:56:43.323995+010020304911Malware Command and Control Activity Detected192.168.2.155736038.55.246.356999TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: x86_64.elfAvira: detected
          Source: x86_64.elfVirustotal: Detection: 46%Perma Link
          Source: x86_64.elfReversingLabs: Detection: 55%
          Source: x86_64.elfJoe Sandbox ML: detected

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:57360 -> 38.55.246.3:56999
          Source: global trafficTCP traffic: 192.168.2.15:57360 -> 38.55.246.3:56999
          Source: global trafficDNS traffic detected: DNS query: webhorizon.icu

          System Summary

          barindex
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: Process Memory Space: x86_64.elf PID: 5650, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: x86_64.elf PID: 5654, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: /tmp/x86_64.elf (PID: 5654)SIGKILL sent: pid: -5651, result: unknownJump to behavior
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: Process Memory Space: x86_64.elf PID: 5650, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: x86_64.elf PID: 5654, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@1/0
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1333/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1695/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/911/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1591/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1585/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/804/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/3407/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1484/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/133/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1479/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/931/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1595/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/3894/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/812/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/933/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/3419/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/35/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/3310/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/260/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/261/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/262/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/142/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/263/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/264/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/265/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/145/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/266/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/267/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/268/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/3303/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/269/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1486/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/1806/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/5601/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5652)File opened: /proc/3440/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/x86_64.elf (PID: 5650)File: /tmp/x86_64.elfJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x86_64.elf PID: 5650, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: x86_64.elf PID: 5654, type: MEMORYSTR
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x86_64.elf PID: 5650, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: x86_64.elf PID: 5654, type: MEMORYSTR
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5654.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5650.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          System Service DiscoveryRemote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582725 Sample: x86_64.elf Startdate: 31/12/2024 Architecture: LINUX Score: 100 20 webhorizon.icu 38.55.246.3, 56999, 57360 COGENT-174US United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 5 other signatures 2->28 9 x86_64.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 x86_64.elf 9->12         started        process6 process7 14 x86_64.elf 12->14         started        16 x86_64.elf 12->16         started        process8 18 x86_64.elf 14->18         started       
          SourceDetectionScannerLabelLink
          x86_64.elf46%VirustotalBrowse
          x86_64.elf55%ReversingLabsLinux.Backdoor.Mirai
          x86_64.elf100%AviraEXP/ELF.Mirai.Z.A
          x86_64.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          webhorizon.icu
          38.55.246.3
          truefalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            38.55.246.3
            webhorizon.icuUnited States
            174COGENT-174USfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            38.55.246.3arm7.elfGet hashmaliciousMirai, MoobotBrowse
              sh4.elfGet hashmaliciousMirai, MoobotBrowse
                mips.elfGet hashmaliciousMirai, MoobotBrowse
                  spc.elfGet hashmaliciousMirai, MoobotBrowse
                    x86.elfGet hashmaliciousMirai, MoobotBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      webhorizon.icuarm7.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      sh4.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      mips.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      spc.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      x86.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      COGENT-174USarm7.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      sh4.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      mips.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      spc.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      x86.elfGet hashmaliciousMirai, MoobotBrowse
                      • 38.55.246.3
                      kwari.arm.elfGet hashmaliciousUnknownBrowse
                      • 149.40.38.7
                      kwari.mpsl.elfGet hashmaliciousUnknownBrowse
                      • 38.78.108.173
                      kwari.mips.elfGet hashmaliciousUnknownBrowse
                      • 39.2.109.188
                      kwari.arm7.elfGet hashmaliciousMiraiBrowse
                      • 38.148.226.59
                      botx.sh4.elfGet hashmaliciousMiraiBrowse
                      • 38.138.63.102
                      No context
                      No context
                      No created / dropped files found
                      File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                      Entropy (8bit):6.032469909370085
                      TrID:
                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                      File name:x86_64.elf
                      File size:59'200 bytes
                      MD5:7e7790f790a915208f7519ad92682dda
                      SHA1:40b7e5dc0b11b799deeaa89b7265c1b8d6c44d3d
                      SHA256:829f93ee611bb41c9a3b1d9243fdbf54a13e9ac50b5333abd84b3305713b2f7a
                      SHA512:e2c6d6ae86a78bde3eaadccec28efd1d46af0ef5aaf20aba12d9fa38870d0a94ad74ffe04798927d2b7a32c0e98e79696da9bf2dd948f5d64982e61b6e6885fa
                      SSDEEP:1536:fzYOpW1Jq+n5BKforamopnEHJa8f66YfuTeDR7CY2:7YQW1JqyPKgraLIPrY6eDR7CY2
                      TLSH:D643181BF581C1FDC09AC174466ABA3EAD3371FD0238F2A677E4EA222D96E215D1DC44
                      File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................P.......P.............(...............Q.td....................................................H...._........H........

                      ELF header

                      Class:ELF64
                      Data:2's complement, little endian
                      Version:1 (current)
                      Machine:Advanced Micro Devices X86-64
                      Version Number:0x1
                      Type:EXEC (Executable file)
                      OS/ABI:UNIX - System V
                      ABI Version:0
                      Entry Point Address:0x400194
                      Flags:0x0
                      ELF Header Size:64
                      Program Header Offset:64
                      Program Header Size:56
                      Number of Program Headers:3
                      Section Header Offset:58560
                      Section Header Size:64
                      Number of Section Headers:10
                      Header String Table Index:9
                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                      NULL0x00x00x00x00x0000
                      .initPROGBITS0x4000e80xe80x130x00x6AX001
                      .textPROGBITS0x4001000x1000xb2460x00x6AX0016
                      .finiPROGBITS0x40b3460xb3460xe0x00x6AX001
                      .rodataPROGBITS0x40b3600xb3600x1f300x00x2A0032
                      .ctorsPROGBITS0x50e0000xe0000x100x00x3WA008
                      .dtorsPROGBITS0x50e0100xe0100x100x00x3WA008
                      .dataPROGBITS0x50e0400xe0400x4400x00x3WA0032
                      .bssNOBITS0x50e4800xe4800x29a80x00x3WA0032
                      .shstrtabSTRTAB0x00xe4800x3e0x00x0001
                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                      LOAD0x00x4000000x4000000xd2900xd2906.35600x5R E0x100000.init .text .fini .rodata
                      LOAD0xe0000x50e0000x50e0000x4800x2e282.15870x6RW 0x100000.ctors .dtors .data .bss
                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-12-31T10:56:43.323995+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.155736038.55.246.356999TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 31, 2024 10:56:43.317445993 CET5736056999192.168.2.1538.55.246.3
                      Dec 31, 2024 10:56:43.322424889 CET569995736038.55.246.3192.168.2.15
                      Dec 31, 2024 10:56:43.322474003 CET5736056999192.168.2.1538.55.246.3
                      Dec 31, 2024 10:56:43.323995113 CET5736056999192.168.2.1538.55.246.3
                      Dec 31, 2024 10:56:43.328774929 CET569995736038.55.246.3192.168.2.15
                      Dec 31, 2024 10:56:44.154264927 CET569995736038.55.246.3192.168.2.15
                      Dec 31, 2024 10:56:44.154350042 CET5736056999192.168.2.1538.55.246.3
                      Dec 31, 2024 10:56:44.154378891 CET5736056999192.168.2.1538.55.246.3
                      Dec 31, 2024 10:56:44.154397011 CET569995736038.55.246.3192.168.2.15
                      Dec 31, 2024 10:56:44.154437065 CET5736056999192.168.2.1538.55.246.3
                      Dec 31, 2024 10:56:44.159166098 CET569995736038.55.246.3192.168.2.15
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 31, 2024 10:56:43.309303999 CET5637553192.168.2.158.8.8.8
                      Dec 31, 2024 10:56:43.316538095 CET53563758.8.8.8192.168.2.15
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Dec 31, 2024 10:56:43.309303999 CET192.168.2.158.8.8.80xe4dbStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Dec 31, 2024 10:56:43.316538095 CET8.8.8.8192.168.2.150xe4dbNo error (0)webhorizon.icu38.55.246.3A (IP address)IN (0x0001)false

                      System Behavior

                      Start time (UTC):09:56:42
                      Start date (UTC):31/12/2024
                      Path:/tmp/x86_64.elf
                      Arguments:/tmp/x86_64.elf
                      File size:59200 bytes
                      MD5 hash:7e7790f790a915208f7519ad92682dda

                      Start time (UTC):09:56:42
                      Start date (UTC):31/12/2024
                      Path:/tmp/x86_64.elf
                      Arguments:-
                      File size:59200 bytes
                      MD5 hash:7e7790f790a915208f7519ad92682dda

                      Start time (UTC):09:56:42
                      Start date (UTC):31/12/2024
                      Path:/tmp/x86_64.elf
                      Arguments:-
                      File size:59200 bytes
                      MD5 hash:7e7790f790a915208f7519ad92682dda

                      Start time (UTC):09:56:42
                      Start date (UTC):31/12/2024
                      Path:/tmp/x86_64.elf
                      Arguments:-
                      File size:59200 bytes
                      MD5 hash:7e7790f790a915208f7519ad92682dda

                      Start time (UTC):09:56:42
                      Start date (UTC):31/12/2024
                      Path:/tmp/x86_64.elf
                      Arguments:-
                      File size:59200 bytes
                      MD5 hash:7e7790f790a915208f7519ad92682dda