Source: /bin/sh (PID: 6270) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6280) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6282) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6284) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6286) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6288) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6290) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6294) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6296) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6339) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6341) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6343) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6345) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6347) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6349) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6351) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6353) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6355) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6373) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6375) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6377) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6379) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6381) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6383) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6385) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6387) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6389) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6404) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6406) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6408) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6410) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6412) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6414) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6416) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6418) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6420) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6245) | Iptables executable: /usr/sbin/iptables -> iptables --flush | Jump to behavior |
Source: /bin/sh (PID: 6270) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6280) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6282) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6284) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6286) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6288) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6290) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6294) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6296) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6339) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6341) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6343) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6345) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6347) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6349) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6351) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6353) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6355) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6373) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6375) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6377) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6379) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6381) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6383) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6385) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6387) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6389) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6404) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6406) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6408) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6410) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6412) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6414) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6416) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6418) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6420) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: Linux4.7.elf, type: SAMPLE | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: Linux4.7.elf, type: SAMPLE | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6227.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6227.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6232.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6232.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6230.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6230.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6225.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6225.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6223.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6223.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6228.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6228.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6226.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6226.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6231.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6231.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 6224.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: 6224.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: /etc/init.d/.chinaz{1736022760, type: DROPPED | Matched rule: Linux_Trojan_Xorddos_a6572d63 Author: unknown |
Source: /etc/init.d/.chinaz{1736022760, type: DROPPED | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: Linux4.7.elf, type: SAMPLE | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: Linux4.7.elf, type: SAMPLE | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6227.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6227.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6232.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6232.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6230.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6230.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6225.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6225.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6223.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6223.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6228.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6228.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6226.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6226.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6231.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6231.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 6224.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: 6224.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORY | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: /etc/init.d/.chinaz{1736022760, type: DROPPED | Matched rule: Linux_Trojan_Xorddos_a6572d63 reference_sample = 2ff33adb421a166895c3816d506a63dff4e1e8fa91f2ac8fb763dc6e8df59d6e, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Xorddos, fingerprint = fd32a773785f847cdd59d41786a8d8a7ba800a71d40d804aca51286d9bb1e1f0, id = a6572d63-f9f3-4dfb-87e6-3b0bafd68a79, last_modified = 2021-09-16 |
Source: /etc/init.d/.chinaz{1736022760, type: DROPPED | Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: /bin/sh (PID: 6270) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6280) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6282) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6284) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6286) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6288) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6290) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6294) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6296) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6339) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6341) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6343) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6345) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6347) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6349) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6351) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6353) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6355) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6373) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6375) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6377) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6379) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6381) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6383) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6385) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6387) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6389) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6404) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6406) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6408) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6410) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6412) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6414) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6416) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6418) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6420) | Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc1.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc2.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc3.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc4.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc5.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc.d/rc1.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc.d/rc2.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc.d/rc3.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc.d/rc4.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6225) | File: /etc/rc.d/rc5.d/S90.chinaz{1736022760 -> /etc/init.d/.chinaz{1736022760 | Jump to behavior |
Source: /usr/sbin/update-rc.d (PID: 6233) | File: /etc/rc1.d/S01.chinaz{1736022760 -> ../init.d/.chinaz{1736022760 | Jump to behavior |
Source: /usr/sbin/update-rc.d (PID: 6233) | File: /etc/rc2.d/S01.chinaz{1736022760 -> ../init.d/.chinaz{1736022760 | Jump to behavior |
Source: /usr/sbin/update-rc.d (PID: 6233) | File: /etc/rc3.d/S01.chinaz{1736022760 -> ../init.d/.chinaz{1736022760 | Jump to behavior |
Source: /usr/sbin/update-rc.d (PID: 6233) | File: /etc/rc4.d/S01.chinaz{1736022760 -> ../init.d/.chinaz{1736022760 | Jump to behavior |
Source: /usr/sbin/update-rc.d (PID: 6233) | File: /etc/rc5.d/S01.chinaz{1736022760 -> ../init.d/.chinaz{1736022760 | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6234) | Shell command executed: sh -c "sed -i '/\\/etc\\/cron.hourly\\/cron.sh/d' /etc/crontab && echo '*/3 * * * * root /etc/cron.hourly/cron.sh' >> /etc/crontab" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6237) | Shell command executed: sh -c "rm -rf /etc/resolv.conf" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6242) | Shell command executed: sh -c whoami | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6243) | Shell command executed: sh -c "iptables --flush" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6244) | Shell command executed: sh -c whoami | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6264) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6269) | Shell command executed: sh -c "touch /home/root/ConfigDatecz" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6276) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6281) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6283) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6285) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6287) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6289) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6293) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6295) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6338) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6340) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6342) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6344) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6346) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6348) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6350) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6352) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6354) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6372) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6374) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6376) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6378) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6380) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6382) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6384) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6386) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6388) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6403) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6405) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6407) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6409) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6411) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6413) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6415) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6417) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /tmp/Linux4.7.elf (PID: 6419) | Shell command executed: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP" | Jump to behavior |
Source: /bin/sh (PID: 6245) | Iptables executable: /usr/sbin/iptables -> iptables --flush | Jump to behavior |
Source: /bin/sh (PID: 6270) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6280) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6282) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6284) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6286) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6288) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6290) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6294) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6296) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6339) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6341) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6343) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6345) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6347) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6349) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6351) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6353) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6355) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6373) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6375) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6377) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6379) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6381) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6383) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6385) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6387) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6389) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6404) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6406) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6408) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6410) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6412) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6414) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6416) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6418) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |
Source: /bin/sh (PID: 6420) | Iptables executable: /usr/sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROP | Jump to behavior |