Linux Analysis Report
yvweY4vsVq.elf

Overview

General Information

Sample Name: yvweY4vsVq.elf
Original Sample Name: 7592df37fb3fea64a0994ac342f319f4.elf
Analysis ID: 877738
MD5: 7592df37fb3fea64a0994ac342f319f4
SHA1: bd612669bbc816883907689411667f34b471259f
SHA256: 4e97dfb181ef3db9a59094b5f468255ee7dc5d5e52543730d8394270a434b162
Tags: 32armelfmirai
Infos:

Detection

Mirai
Score: 68
Range: 0 - 100
Whitelisted: false

Signatures

Yara detected Mirai
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Uses known network protocols on non-standard ports
Sample tries to kill multiple processes (SIGKILL)
Sample contains only a LOAD segment without any section mappings
Deletes log files
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "systemctl" command used for controlling the systemd system and service manager
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
ELF contains segments with high entropy indicating compressed/encrypted content

Classification

Name Description Attribution Blogpost URLs Link
Mirai Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai

AV Detection

barindex
Source: yvweY4vsVq.elf ReversingLabs: Detection: 54%
Source: yvweY4vsVq.elf Virustotal: Detection: 50% Perma Link

Networking

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40678
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40682
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40692
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40698
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40706
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40710
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40716
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40720
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40724
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40726
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40730
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40732
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40738
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40740
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40742
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40744
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40746
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40748
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40752
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40754
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40756
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40758
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40760
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40762
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40764
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40768
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40770
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40772
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40774
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40778
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:48592 -> 107.189.3.153:1312
Source: /tmp/yvweY4vsVq.elf (PID: 6293) Socket: 0.0.0.0::0 Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6293) Socket: 0.0.0.0::53413 Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6293) Socket: 0.0.0.0::80 Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6293) Socket: 0.0.0.0::37215 Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) Socket: 0.0.0.0::0 Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) Socket: 0.0.0.0::53413 Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) Socket: 0.0.0.0::80 Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) Socket: 0.0.0.0::37215 Jump to behavior
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 107.189.3.153
Source: unknown TCP traffic detected without corresponding DNS query: 76.0.183.154
Source: unknown TCP traffic detected without corresponding DNS query: 218.45.121.154
Source: unknown TCP traffic detected without corresponding DNS query: 126.137.100.236
Source: unknown TCP traffic detected without corresponding DNS query: 183.86.244.155
Source: unknown TCP traffic detected without corresponding DNS query: 120.95.49.115
Source: unknown TCP traffic detected without corresponding DNS query: 201.206.91.129
Source: unknown TCP traffic detected without corresponding DNS query: 136.240.152.7
Source: unknown TCP traffic detected without corresponding DNS query: 79.160.239.125
Source: unknown TCP traffic detected without corresponding DNS query: 246.183.54.88
Source: unknown TCP traffic detected without corresponding DNS query: 23.36.125.81
Source: unknown TCP traffic detected without corresponding DNS query: 93.6.77.59
Source: unknown TCP traffic detected without corresponding DNS query: 75.192.32.102
Source: unknown TCP traffic detected without corresponding DNS query: 87.220.234.113
Source: unknown TCP traffic detected without corresponding DNS query: 174.229.190.231
Source: unknown TCP traffic detected without corresponding DNS query: 153.190.168.241
Source: unknown TCP traffic detected without corresponding DNS query: 216.202.192.22
Source: unknown TCP traffic detected without corresponding DNS query: 23.233.187.152
Source: unknown TCP traffic detected without corresponding DNS query: 97.77.143.147
Source: unknown TCP traffic detected without corresponding DNS query: 155.226.78.146
Source: unknown TCP traffic detected without corresponding DNS query: 90.225.231.43
Source: unknown TCP traffic detected without corresponding DNS query: 104.13.239.230
Source: unknown TCP traffic detected without corresponding DNS query: 167.152.63.108
Source: unknown TCP traffic detected without corresponding DNS query: 247.136.170.47
Source: unknown TCP traffic detected without corresponding DNS query: 166.11.184.189
Source: unknown TCP traffic detected without corresponding DNS query: 149.168.18.245
Source: unknown TCP traffic detected without corresponding DNS query: 93.214.165.127
Source: unknown TCP traffic detected without corresponding DNS query: 151.171.214.178
Source: unknown TCP traffic detected without corresponding DNS query: 16.229.95.68
Source: unknown TCP traffic detected without corresponding DNS query: 252.75.153.96
Source: unknown TCP traffic detected without corresponding DNS query: 18.99.237.72
Source: unknown TCP traffic detected without corresponding DNS query: 67.42.182.45
Source: unknown TCP traffic detected without corresponding DNS query: 190.36.146.59
Source: unknown TCP traffic detected without corresponding DNS query: 195.175.152.36
Source: unknown TCP traffic detected without corresponding DNS query: 211.116.191.67
Source: unknown TCP traffic detected without corresponding DNS query: 35.27.252.236
Source: unknown TCP traffic detected without corresponding DNS query: 192.228.72.55
Source: unknown TCP traffic detected without corresponding DNS query: 125.152.129.219
Source: unknown TCP traffic detected without corresponding DNS query: 85.64.190.7
Source: unknown TCP traffic detected without corresponding DNS query: 83.240.163.128
Source: unknown TCP traffic detected without corresponding DNS query: 47.77.83.183
Source: unknown TCP traffic detected without corresponding DNS query: 216.105.159.246
Source: unknown TCP traffic detected without corresponding DNS query: 139.7.13.2
Source: unknown TCP traffic detected without corresponding DNS query: 108.125.130.242
Source: unknown TCP traffic detected without corresponding DNS query: 120.26.142.118
Source: unknown TCP traffic detected without corresponding DNS query: 96.106.78.8
Source: unknown TCP traffic detected without corresponding DNS query: 207.53.121.27
Source: unknown TCP traffic detected without corresponding DNS query: 167.147.171.44
Source: unknown TCP traffic detected without corresponding DNS query: 149.95.216.142
Source: yvweY4vsVq.elf String found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: /tmp/yvweY4vsVq.elf (PID: 6293) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 6293, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 720, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 759, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 788, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 800, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 847, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 884, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 1334, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 1335, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 1860, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 1872, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2096, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2097, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2102, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2180, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2208, result: successful Jump to behavior
Source: LOAD without section mappings Program segment: 0x8000
Source: /tmp/yvweY4vsVq.elf (PID: 6293) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 6293, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 720, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 759, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 788, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 800, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 847, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 884, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 1334, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 1335, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 1860, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 1872, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2096, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2097, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2102, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2180, result: successful Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) SIGKILL sent: pid: 2208, result: successful Jump to behavior
Source: classification engine Classification label: mal68.spre.troj.evad.linELF@0/49@0/0

Data Obfuscation

barindex
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2033/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2033/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1582/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1582/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2275/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/6191/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/6192/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1612/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1612/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1579/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1579/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1699/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1699/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1335/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1335/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1698/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1698/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2028/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2028/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1334/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1334/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1576/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1576/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2302/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/3236/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2025/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2025/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2146/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2146/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/910/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/912/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/912/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/912/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/759/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/759/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/759/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/517/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2307/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/918/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/918/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/918/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1594/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1594/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2285/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2281/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1349/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1349/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1623/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1623/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/761/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/761/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/761/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1622/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1622/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/884/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/884/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/884/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1983/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1983/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2038/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2038/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1586/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1586/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1465/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1465/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1344/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1344/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1860/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1860/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1463/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1463/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2156/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2156/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/800/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/800/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/800/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/801/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/801/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/801/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1629/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1629/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1627/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1627/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1900/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1900/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/491/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/491/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/491/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2294/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2050/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/2050/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1877/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1877/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/772/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/772/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/772/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1633/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1633/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1599/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1599/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1632/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1632/exe Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1477/fd Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6299) File opened: /proc/1477/exe Jump to behavior
Source: /usr/sbin/logrotate (PID: 6241) Shell command executed: sh -c "\n\t\tinvoke-rc.d --quiet cups restart > /dev/null\n" logrotate_script "/var/log/cups/*log " Jump to behavior
Source: /usr/sbin/logrotate (PID: 6252) Shell command executed: sh -c /usr/lib/rsyslog/rsyslog-rotate logrotate_script /var/log/syslog Jump to behavior
Source: /usr/sbin/invoke-rc.d (PID: 6245) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-enabled cups.service Jump to behavior
Source: /usr/sbin/invoke-rc.d (PID: 6250) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active cups.service Jump to behavior
Source: /usr/lib/rsyslog/rsyslog-rotate (PID: 6254) Systemctl executable: /usr/bin/systemctl -> systemctl kill -s HUP rsyslog.service Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40678
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40682
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40692
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40698
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40706
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40710
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40716
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40720
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40724
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40726
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40730
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40732
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40738
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40740
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40742
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40744
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40746
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40748
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40752
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40754
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40756
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40758
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40760
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40762
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40764
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40768
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40770
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40772
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40774
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40778
Source: yvweY4vsVq.elf Submission file: segment LOAD with 7.9335 entropy (max. 8.0)
Source: /usr/sbin/logrotate (PID: 6198) Truncated file: /var/log/cups/access_log.1 Jump to behavior
Source: /usr/sbin/logrotate (PID: 6198) Truncated file: /var/log/syslog.1 Jump to behavior
Source: /tmp/yvweY4vsVq.elf (PID: 6291) Queries kernel information via 'uname': Jump to behavior
Source: yvweY4vsVq.elf, 6291.1.00007fffb98e5000.00007fffb9906000.rw-.sdmp, yvweY4vsVq.elf, 6293.1.00007fffb98e5000.00007fffb9906000.rw-.sdmp, yvweY4vsVq.elf, 6295.1.00007fffb98e5000.00007fffb9906000.rw-.sdmp, yvweY4vsVq.elf, 6301.1.00007fffb98e5000.00007fffb9906000.rw-.sdmp Binary or memory string: Dx86_64/usr/bin/qemu-arm/tmp/yvweY4vsVq.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/yvweY4vsVq.elf
Source: yvweY4vsVq.elf, 6291.1.000055d7e0edc000.000055d7e10ea000.rw-.sdmp, yvweY4vsVq.elf, 6293.1.000055d7e0edc000.000055d7e10ea000.rw-.sdmp, yvweY4vsVq.elf, 6295.1.000055d7e0edc000.000055d7e10ea000.rw-.sdmp, yvweY4vsVq.elf, 6301.1.000055d7e0edc000.000055d7e10ea000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: yvweY4vsVq.elf, 6291.1.000055d7e0edc000.000055d7e10ea000.rw-.sdmp, yvweY4vsVq.elf, 6293.1.000055d7e0edc000.000055d7e10ea000.rw-.sdmp, yvweY4vsVq.elf, 6295.1.000055d7e0edc000.000055d7e10ea000.rw-.sdmp, yvweY4vsVq.elf, 6301.1.000055d7e0edc000.000055d7e10ea000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: yvweY4vsVq.elf, 6291.1.00007fffb98e5000.00007fffb9906000.rw-.sdmp, yvweY4vsVq.elf, 6293.1.00007fffb98e5000.00007fffb9906000.rw-.sdmp, yvweY4vsVq.elf, 6295.1.00007fffb98e5000.00007fffb9906000.rw-.sdmp, yvweY4vsVq.elf, 6301.1.00007fffb98e5000.00007fffb9906000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm

Stealing of Sensitive Information

barindex
Source: Yara match File source: dump.pcap, type: PCAP

Remote Access Functionality

barindex
Source: Yara match File source: dump.pcap, type: PCAP
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs