Click to jump to signature section
Source: x86.elf | ReversingLabs: Detection: 42% |
Source: global traffic | TCP traffic: 192.168.2.23:39354 -> 85.239.34.134:999 |
Source: global traffic | TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443 |
Source: global traffic | TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443 |
Source: global traffic | TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.239.34.134 |
Source: unknown | Network traffic detected: HTTP traffic on port 43928 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 42836 -> 443 |
Source: x86.elf, type: SAMPLE | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: x86.elf, type: SAMPLE | Matched rule: Linux_Trojan_Mirai_122ff2e6 Author: unknown |
Source: x86.elf, type: SAMPLE | Matched rule: Linux_Trojan_Mirai_fa48b592 Author: unknown |
Source: x86.elf, type: SAMPLE | Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown |
Source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_122ff2e6 Author: unknown |
Source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_fa48b592 Author: unknown |
Source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown |
Source: Process Memory Space: x86.elf PID: 6239, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: ELF static info symbol of initial sample | .symtab present: no |
Source: x86.elf, type: SAMPLE | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: x86.elf, type: SAMPLE | Matched rule: Linux_Trojan_Mirai_122ff2e6 reference_sample = c7dd999a033fa3edc1936785b87cd69ce2f5cac5a084ddfaf527a1094e718bc4, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3c9ffd7537e30a21eefa6c174f801264b92a85a1bc73e34e6dc9e29f84658348, id = 122ff2e6-56e6-4aa8-a3ec-c19d31eb1f80, last_modified = 2021-09-16 |
Source: x86.elf, type: SAMPLE | Matched rule: Linux_Trojan_Mirai_fa48b592 reference_sample = c9e33befeec133720b3ba40bb3cd7f636aad80f72f324c5fe65ac7af271c49ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8838d2752b310dbf7d12f6cf023244aaff4fdf5b55cf1e3b71843210df0fcf88, id = fa48b592-8d80-45af-a3e4-232695b8f5dd, last_modified = 2021-09-16 |
Source: x86.elf, type: SAMPLE | Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26 |
Source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_122ff2e6 reference_sample = c7dd999a033fa3edc1936785b87cd69ce2f5cac5a084ddfaf527a1094e718bc4, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3c9ffd7537e30a21eefa6c174f801264b92a85a1bc73e34e6dc9e29f84658348, id = 122ff2e6-56e6-4aa8-a3ec-c19d31eb1f80, last_modified = 2021-09-16 |
Source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_fa48b592 reference_sample = c9e33befeec133720b3ba40bb3cd7f636aad80f72f324c5fe65ac7af271c49ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8838d2752b310dbf7d12f6cf023244aaff4fdf5b55cf1e3b71843210df0fcf88, id = fa48b592-8d80-45af-a3e4-232695b8f5dd, last_modified = 2021-09-16 |
Source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26 |
Source: Process Memory Space: x86.elf PID: 6239, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: classification engine | Classification label: mal76.troj.linELF@0/0@0/0 |
Source: Yara match | File source: x86.elf, type: SAMPLE |
Source: Yara match | File source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: x86.elf PID: 6239, type: MEMORYSTR |
Source: Yara match | File source: x86.elf, type: SAMPLE |
Source: Yara match | File source: 6239.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: x86.elf PID: 6239, type: MEMORYSTR |