Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_268aac0b Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0cb1699c Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_70ef58f1 Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_3a85a418 Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_485c4b13 Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_7d05725e Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_2e3f67a9 Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0d73971c Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Detects Mirai Botnet Malware Author: Florian Roth |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_268aac0b Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0cb1699c Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_70ef58f1 Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_3a85a418 Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_485c4b13 Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_7d05725e Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_2e3f67a9 Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0d73971c Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Detects Mirai Botnet Malware Author: Florian Roth |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_268aac0b Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0cb1699c Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_70ef58f1 Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_3a85a418 Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_485c4b13 Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_7d05725e Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_2e3f67a9 Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0d73971c Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Detects Mirai Botnet Malware Author: Florian Roth |
Source: Process Memory Space: boatnet.i686.elf PID: 5651, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: boatnet.i686.elf PID: 5651, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: boatnet.i686.elf PID: 5653, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: boatnet.i686.elf PID: 5653, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: boatnet.i686.elf PID: 5654, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: boatnet.i686.elf PID: 5654, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_268aac0b reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 9c581721bf82af7dc6482a2c41af5fb3404e01c82545c7b2b29230f707014781, id = 268aac0b-c5c7-4035-8381-4e182de91e32, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0cb1699c reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6e44c68bba8c9fb53ac85080b9ad765579f027cabfea5055a0bb3a85b8671089, id = 0cb1699c-9a08-4885-aa7f-0f1ee2543cac, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_70ef58f1 reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c46eac9185e5f396456004d1e0c42b54a9318e0450f797c55703122cfb8fea89, id = 70ef58f1-ac74-4e33-ae03-e68d1d5a4379, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_3a85a418 reference_sample = 86a43b39b157f47ab12e9dc1013b4eec0e1792092d4cef2772a21a9bf4fc518a, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 554aff5770bfe8fdeae94f5f5a0fd7f7786340a95633433d8e686af1c25b8cec, id = 3a85a418-2bd9-445a-86cb-657ca7edf566, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_485c4b13 reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 28f3e8982cee2836a59721c88ee0a9159ad6fdfc27c0091927f5286f3a731e9a, id = 485c4b13-3c7c-47a7-b926-8237cb759ad7, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_7d05725e reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 7fcd34cb7c37836a1fa8eb9375a80da01bda0e98c568422255d83c840acc0714, id = 7d05725e-db59-42a7-99aa-99de79728126, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_2e3f67a9 reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6a06815f3d2e5f1a7a67f4264953dbb2e9d14e5f3486b178da845eab5b922d4f, id = 2e3f67a9-6fd5-4457-a626-3a9015bdb401, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0d73971c reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 95279bc45936ca867efb30040354c8ff81de31dccda051cfd40b4fb268c228c5, id = 0d73971c-4253-4e7d-b1e1-20b031197f9e, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26 |
Source: 5653.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_268aac0b reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 9c581721bf82af7dc6482a2c41af5fb3404e01c82545c7b2b29230f707014781, id = 268aac0b-c5c7-4035-8381-4e182de91e32, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0cb1699c reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6e44c68bba8c9fb53ac85080b9ad765579f027cabfea5055a0bb3a85b8671089, id = 0cb1699c-9a08-4885-aa7f-0f1ee2543cac, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_70ef58f1 reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c46eac9185e5f396456004d1e0c42b54a9318e0450f797c55703122cfb8fea89, id = 70ef58f1-ac74-4e33-ae03-e68d1d5a4379, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_3a85a418 reference_sample = 86a43b39b157f47ab12e9dc1013b4eec0e1792092d4cef2772a21a9bf4fc518a, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 554aff5770bfe8fdeae94f5f5a0fd7f7786340a95633433d8e686af1c25b8cec, id = 3a85a418-2bd9-445a-86cb-657ca7edf566, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_485c4b13 reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 28f3e8982cee2836a59721c88ee0a9159ad6fdfc27c0091927f5286f3a731e9a, id = 485c4b13-3c7c-47a7-b926-8237cb759ad7, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_7d05725e reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 7fcd34cb7c37836a1fa8eb9375a80da01bda0e98c568422255d83c840acc0714, id = 7d05725e-db59-42a7-99aa-99de79728126, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_2e3f67a9 reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6a06815f3d2e5f1a7a67f4264953dbb2e9d14e5f3486b178da845eab5b922d4f, id = 2e3f67a9-6fd5-4457-a626-3a9015bdb401, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0d73971c reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 95279bc45936ca867efb30040354c8ff81de31dccda051cfd40b4fb268c228c5, id = 0d73971c-4253-4e7d-b1e1-20b031197f9e, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26 |
Source: 5654.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_268aac0b reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 9c581721bf82af7dc6482a2c41af5fb3404e01c82545c7b2b29230f707014781, id = 268aac0b-c5c7-4035-8381-4e182de91e32, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0cb1699c reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6e44c68bba8c9fb53ac85080b9ad765579f027cabfea5055a0bb3a85b8671089, id = 0cb1699c-9a08-4885-aa7f-0f1ee2543cac, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_70ef58f1 reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c46eac9185e5f396456004d1e0c42b54a9318e0450f797c55703122cfb8fea89, id = 70ef58f1-ac74-4e33-ae03-e68d1d5a4379, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_3a85a418 reference_sample = 86a43b39b157f47ab12e9dc1013b4eec0e1792092d4cef2772a21a9bf4fc518a, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 554aff5770bfe8fdeae94f5f5a0fd7f7786340a95633433d8e686af1c25b8cec, id = 3a85a418-2bd9-445a-86cb-657ca7edf566, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_485c4b13 reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 28f3e8982cee2836a59721c88ee0a9159ad6fdfc27c0091927f5286f3a731e9a, id = 485c4b13-3c7c-47a7-b926-8237cb759ad7, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_7d05725e reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 7fcd34cb7c37836a1fa8eb9375a80da01bda0e98c568422255d83c840acc0714, id = 7d05725e-db59-42a7-99aa-99de79728126, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_2e3f67a9 reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6a06815f3d2e5f1a7a67f4264953dbb2e9d14e5f3486b178da845eab5b922d4f, id = 2e3f67a9-6fd5-4457-a626-3a9015bdb401, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_0d73971c reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 95279bc45936ca867efb30040354c8ff81de31dccda051cfd40b4fb268c228c5, id = 0d73971c-4253-4e7d-b1e1-20b031197f9e, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26 |
Source: 5651.1.0000000008048000.000000000805d000.r-x.sdmp, type: MEMORY | Matched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b |
Source: Process Memory Space: boatnet.i686.elf PID: 5651, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.i686.elf PID: 5651, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.i686.elf PID: 5653, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.i686.elf PID: 5653, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.i686.elf PID: 5654, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: boatnet.i686.elf PID: 5654, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5660/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5661/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5662/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5663/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1185/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3241/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3483/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1732/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1730/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1333/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1695/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3235/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3234/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5654/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/911/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/515/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/914/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1617/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5658/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5659/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1615/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/917/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3890/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3255/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3253/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1591/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3252/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3251/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3250/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1623/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1588/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3249/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/764/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3368/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1585/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3246/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3488/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/766/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/800/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/888/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/802/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1509/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/803/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/804/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3800/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3801/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1867/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3407/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5680/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1484/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/490/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1514/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1634/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1479/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1875/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/654/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3379/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/655/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/656/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/777/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/931/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1595/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/657/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/812/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/779/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/658/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/933/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/418/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/419/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3419/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5690/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3310/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3275/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3274/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3273/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3394/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3272/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/782/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3303/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3708/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1762/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3027/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1486/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/789/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1806/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1660/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3440/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/793/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/794/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3316/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/674/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/796/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/675/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/676/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1498/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1497/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1496/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3157/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3278/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3399/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3798/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3799/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/1659/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/5598/cmdline | Jump to behavior |
Source: /tmp/boatnet.i686.elf (PID: 5652) | File opened: /proc/3332/cmdline | Jump to behavior |