Source: na.elf |
ReversingLabs: Detection: 70% |
Source: unknown |
HTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.23:33606 version: TLS 1.2 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39194 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39196 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39218 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39206 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39222 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39200 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39210 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39202 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39198 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39214 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39212 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39224 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39204 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39220 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39208 -> 158.220.114.75:55650 |
Source: Network traffic |
Suricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:39216 -> 158.220.114.75:55650 |
Source: global traffic |
TCP traffic: 192.168.2.23:39194 -> 158.220.114.75:55650 |
Source: /tmp/na.elf (PID: 6228) |
Socket: 192.168.2.23:55650 |
Jump to behavior |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 54.171.230.55 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: global traffic |
DNS traffic detected: DNS query: dump.hduak.site |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 33606 |
Source: unknown |
Network traffic detected: HTTP traffic on port 43928 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 33606 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 42836 -> 443 |
Source: unknown |
HTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.23:33606 version: TLS 1.2 |
Source: ELF static info symbol of initial sample |
.symtab present: no |
Source: classification engine |
Classification label: mal84.troj.evad.linELF@0/0@16/0 |
Source: /usr/bin/dash (PID: 6236) |
Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.oS3FoE8Jb0 /tmp/tmp.4mzvJzgfA7 /tmp/tmp.4d3NucQSd1 |
Jump to behavior |
Source: /usr/bin/dash (PID: 6245) |
Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.oS3FoE8Jb0 /tmp/tmp.4mzvJzgfA7 /tmp/tmp.4d3NucQSd1 |
Jump to behavior |
Source: /tmp/na.elf (PID: 6228) |
File: /tmp/na.elf |
Jump to behavior |
Source: /tmp/na.elf (PID: 6228) |
Queries kernel information via 'uname': |
Jump to behavior |
Source: na.elf, 6228.1.00007ffccf73b000.00007ffccf75c000.rw-.sdmp |
Binary or memory string: Xx86_64/usr/bin/qemu-sh4/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf |
Source: na.elf, 6228.1.00007ffccf73b000.00007ffccf75c000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-sh4 |
Source: na.elf, 6228.1.0000558d7eadb000.0000558d7eb3e000.rw-.sdmp |
Binary or memory string: U5!/etc/qemu-binfmt/sh4 |
Source: na.elf, 6228.1.0000558d7eadb000.0000558d7eb3e000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/sh4 |
Source: Yara match |
File source: na.elf, type: SAMPLE |
Source: Yara match |
File source: 6228.1.00007f2c8c37f000.00007f2c8c38b000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: na.elf PID: 6228, type: MEMORYSTR |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Traffic |
Suricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) |
Source: Yara match |
File source: na.elf, type: SAMPLE |
Source: Yara match |
File source: 6228.1.00007f2c8c37f000.00007f2c8c38b000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: na.elf PID: 6228, type: MEMORYSTR |