Linux Analysis Report
yakuza.arm6.elf

Overview

General Information

Sample name: yakuza.arm6.elf
Analysis ID: 1541842
MD5: 1d2b85b413a040d04ef9d3b26a75a809
SHA1: 6d7a21f7722159916a1d89b7882337c34baf7dfc
SHA256: b699cd64b9895cdcc325d7dd96c9eca623d3ec0247d20f39323547132c8fa63b
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Uses IRC for communication with a C&C
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "kill" or "pkill" command typically used to terminate processes
Reads CPU information from /sys indicative of miner or evasive malware
Reads system information from the proc file system
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are user agent strings indicative of HTTP manipulation
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

AV Detection

barindex
Source: yakuza.arm6.elf Avira: detected
Source: yakuza.arm6.elf ReversingLabs: Detection: 68%
Source: /usr/bin/pkill (PID: 5598) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5636) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5642) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5646) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5655) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5662) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5689) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5697) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5704) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5708) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5717) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5721) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5727) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5735) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5743) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5748) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5755) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5764) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5772) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5783) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5787) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5794) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5801) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5810) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5814) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5824) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5828) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5834) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5840) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5847) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5851) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5861) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5866) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5872) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5878) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5882) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5888) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5896) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5905) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5909) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5917) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5926) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5937) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5942) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5948) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5957) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5964) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5970) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5974) Reads CPU info from /sys: /sys/devices/system/cpu/online

Networking

barindex
Source: unknown IRC traffic detected: 192.168.2.14:47564 -> 194.110.247.46:5060 NICK [OSX|ARM4T]IYXYiwU USER IYXYiwU localhost localhost :IYXYiwU
Source: unknown Network traffic detected: IRC traffic on port 47564 -> 5060
Source: unknown Network traffic detected: IRC traffic on port 47564 -> 5060
Source: global traffic TCP traffic: 192.168.2.14:47564 -> 194.110.247.46:5060
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: yakuza.arm6.elf String found in binary or memory: http://87.10.220.221/yak.sh;
Source: yakuza.arm6.elf String found in binary or memory: https://youtu.be/dQw4w9WgXcQ
Source: yakuza.arm6.elf String found in binary or memory: https://youtu.be/dQw4w9WgXcQNever

System Summary

barindex
Source: yakuza.arm6.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_6a510422 Author: unknown
Source: yakuza.arm6.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_d2953f92 Author: unknown
Source: yakuza.arm6.elf, type: SAMPLE Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: 5620.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 Author: unknown
Source: 5588.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 Author: unknown
Source: 5580.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 Author: unknown
Source: 5588.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_6a510422 Author: unknown
Source: 5588.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 Author: unknown
Source: 5588.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: 5580.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_6a510422 Author: unknown
Source: 5580.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 Author: unknown
Source: 5580.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: 5620.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_6a510422 Author: unknown
Source: 5620.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 Author: unknown
Source: 5620.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: Process Memory Space: yakuza.arm6.elf PID: 5580, type: MEMORYSTR Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: Process Memory Space: yakuza.arm6.elf PID: 5588, type: MEMORYSTR Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: Process Memory Space: yakuza.arm6.elf PID: 5620, type: MEMORYSTR Matched rule: Linux_Trojan_Tsunami_8a11f9be Author: unknown
Source: Initial sample String containing 'busybox' found: busybox
Source: Initial sample String containing 'busybox' found: 902i13BzSxLxBxeYHOHO-LUGO7HOHO-U79OLJuYfouyf87NiGGeR69xdSO190Ij1XLOLKIKEEEDDEekjheory98escansh4MDMAfdevalvexscanspcMELTEDNINJAREALZflexsonskidsscanx86MISAKI-U79OLfoAxi102kxeswodjwodjwojMmKiy7f87lfreecookiex86sysgpufrgegesysupdater0DnAzepdNiGGeRD0nks69frgreutelnetd0x766f6964NiGGeRd0nks1337gafturasgbsigboa120i3UI49OaF3geaevaiolmao123123aOfurain0n4H34DggTrexwasads1293194hjXDOthLaLosnggtwget-log1337SoraLOADERSAIAKINAggtq1378bfp919GRB1Q2SAIAKUSOggtr14FaSEXSLAVE1337ggtt1902a3u912u3u4haetrghbr19ju3dSORAojkf120hehahejeje922U2JDJA901F91SlaVLav12helpmedaddthhhhh2wgg9qphbqSlav3Th3seD3viceshzSmYZjYMQ5GbfSoRAxD123LOLiaGv5aA3SoRAxD420LOLinsomni640277SoraBeReppin1337ipcamCache66tlGg9QTjUYfouyf876ke3TOKYO3lyEeaXul2dULCVxh93OfjHZ2zTY2gD6MZvKc7KU6rmMkiy6f87lA023UU4U24UIUTheWeekndmioribitchesA5p9TheWeekndsmnblkjpoiAbAdTokyosnebAkiruU8inTznetstatsAlexW9RCAKM20TnewnetwordAyo215WordnloadsBAdAsVWordmanenotyakuzaaBelchWordnetsobpBigN0gg0r420X0102I34fofhasfhiafhoiX19I239124UIUoismDeportedXSHJEHHEIIHWOolsVNwo12DeportedDeportedXkTer0Gb
Source: Initial sample String containing 'busybox' found: pkill -9 %s || busybox pkill -9 %s
Source: Initial sample String containing 'busybox' found: pkill -9 %s || busybox pkill -9 %shistory -c;history -wcd /root;rm -f .bash_historycd /var/tmp; rm -f *NOTICE %s :MOVE <server>
Source: yakuza.arm6.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_6a510422 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 8ee116ff41236771cdc8dc4b796c3b211502413ae631d5b5aedbbaa2eccc3b75, id = 6a510422-3662-4fdb-9c03-0101f16e87cd, last_modified = 2021-09-16
Source: yakuza.arm6.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_d2953f92 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 276c6d62a8a335d0e2421b6b5b90c2c0eb69eec294bc9fcdeb7743abbf08d8bc, id = d2953f92-62ee-428d-88c5-723914c88c6e, last_modified = 2021-09-16
Source: yakuza.arm6.elf, type: SAMPLE Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: 5620.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 276c6d62a8a335d0e2421b6b5b90c2c0eb69eec294bc9fcdeb7743abbf08d8bc, id = d2953f92-62ee-428d-88c5-723914c88c6e, last_modified = 2021-09-16
Source: 5588.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 276c6d62a8a335d0e2421b6b5b90c2c0eb69eec294bc9fcdeb7743abbf08d8bc, id = d2953f92-62ee-428d-88c5-723914c88c6e, last_modified = 2021-09-16
Source: 5580.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 276c6d62a8a335d0e2421b6b5b90c2c0eb69eec294bc9fcdeb7743abbf08d8bc, id = d2953f92-62ee-428d-88c5-723914c88c6e, last_modified = 2021-09-16
Source: 5588.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_6a510422 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 8ee116ff41236771cdc8dc4b796c3b211502413ae631d5b5aedbbaa2eccc3b75, id = 6a510422-3662-4fdb-9c03-0101f16e87cd, last_modified = 2021-09-16
Source: 5588.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 276c6d62a8a335d0e2421b6b5b90c2c0eb69eec294bc9fcdeb7743abbf08d8bc, id = d2953f92-62ee-428d-88c5-723914c88c6e, last_modified = 2021-09-16
Source: 5588.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: 5580.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_6a510422 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 8ee116ff41236771cdc8dc4b796c3b211502413ae631d5b5aedbbaa2eccc3b75, id = 6a510422-3662-4fdb-9c03-0101f16e87cd, last_modified = 2021-09-16
Source: 5580.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 276c6d62a8a335d0e2421b6b5b90c2c0eb69eec294bc9fcdeb7743abbf08d8bc, id = d2953f92-62ee-428d-88c5-723914c88c6e, last_modified = 2021-09-16
Source: 5580.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: 5620.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_6a510422 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 8ee116ff41236771cdc8dc4b796c3b211502413ae631d5b5aedbbaa2eccc3b75, id = 6a510422-3662-4fdb-9c03-0101f16e87cd, last_modified = 2021-09-16
Source: 5620.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_d2953f92 severity = 100, os = linux, arch_context = x86, creation_date = 2021-06-28, scan_context = file, memory, reference = 14cc92b99daa0c91aa09d9a7996ee5549a5cacd7be733960b2cf3681a7c2b628, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 276c6d62a8a335d0e2421b6b5b90c2c0eb69eec294bc9fcdeb7743abbf08d8bc, id = d2953f92-62ee-428d-88c5-723914c88c6e, last_modified = 2021-09-16
Source: 5620.1.00007feda8017000.00007feda8035000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: Process Memory Space: yakuza.arm6.elf PID: 5580, type: MEMORYSTR Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: Process Memory Space: yakuza.arm6.elf PID: 5588, type: MEMORYSTR Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: Process Memory Space: yakuza.arm6.elf PID: 5620, type: MEMORYSTR Matched rule: Linux_Trojan_Tsunami_8a11f9be reference_sample = 1f773d0e00d40eecde9e3ab80438698923a2620036c2fc33315ef95229e98571, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = 91e2572a3bb8583e20042578e95e1746501c6a71ef7635af2c982a05b18d7c6d, id = 8a11f9be-dc85-4695-9f38-80ca0304780e, last_modified = 2021-09-16
Source: classification engine Classification label: mal72.troj.linELF@0/0@2/0
Source: yakuza.arm6.elf ELF static info symbol of initial sample: /home/landley/work/ab7/build/temp-armv6l/gcc-core/gcc/config/arm/lib1funcs.asm
Source: yakuza.arm6.elf ELF static info symbol of initial sample: /home/landley/work/ab7/build/temp-armv6l/gcc-core/gcc/config/arm/lib1funcs.asm
Source: yakuza.arm6.elf ELF static info symbol of initial sample: /home/landley/work/ab7/build/temp-armv6l/gcc-core/gcc/config/arm/lib1funcs.asm
Source: yakuza.arm6.elf ELF static info symbol of initial sample: /home/landley/work/ab7/build/temp-armv6l/gcc-core/gcc/config/arm/lib1funcs.asm
Source: yakuza.arm6.elf ELF static info symbol of initial sample: /home/landley/work/ab7/build/temp-armv6l/gcc-core/gcc/config/arm/lib1funcs.asm
Source: yakuza.arm6.elf ELF static info symbol of initial sample: /home/landley/work/ab7/build/temp-armv6l/gcc-core/gcc/config/arm/lib1funcs.asm
Source: yakuza.arm6.elf ELF static info symbol of initial sample: /home/landley/work/ab7/build/temp-armv6l/gcc-core/gcc/config/arm/lib1funcs.asm
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3761/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3761/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1583/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1583/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/2672/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/2672/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/110/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/110/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/111/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/111/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/112/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/112/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/113/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/113/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/234/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/234/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1577/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1577/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/114/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/114/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/235/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/235/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/115/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/115/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/116/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/116/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/117/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/117/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/118/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/118/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/119/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/119/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/10/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/10/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/917/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/917/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3879/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3879/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/11/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/11/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/12/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/12/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/13/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/13/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/14/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/14/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/15/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/15/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/16/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/16/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/17/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/17/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/18/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/18/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/19/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/19/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1593/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1593/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/240/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/240/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/120/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/120/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3094/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3094/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/121/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/121/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/242/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/242/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3406/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3406/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/122/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/122/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/243/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/243/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/2/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/2/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/123/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/123/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/244/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/244/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1589/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1589/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/124/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/124/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/245/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/245/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1588/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/1588/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/125/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/125/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/4/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/4/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/246/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/246/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3402/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/3402/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/126/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/126/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/5/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/5/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/247/status Jump to behavior
Source: /usr/bin/pkill (PID: 5662) File opened: /proc/247/cmdline Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5591) Shell command executed: sh -c "pkill -9 902i13 || busybox pkill -9 902i13" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5630) Shell command executed: sh -c "pkill -9 BzSxLxBxeY || busybox pkill -9 BzSxLxBxeY" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5640) Shell command executed: sh -c "pkill -9 HOHO-LUGO7 || busybox pkill -9 HOHO-LUGO7" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5644) Shell command executed: sh -c "pkill -9 HOHO-U79OL || busybox pkill -9 HOHO-U79OL" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5650) Shell command executed: sh -c "pkill -9 JuYfouyf87 || busybox pkill -9 JuYfouyf87" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5657) Shell command executed: sh -c "pkill -9 NiGGeR69xd || busybox pkill -9 NiGGeR69xd" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5687) Shell command executed: sh -c "pkill -9 SO190Ij1X || busybox pkill -9 SO190Ij1X" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5691) Shell command executed: sh -c "pkill -9 LOLKIKEEEDDE || busybox pkill -9 LOLKIKEEEDDE" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5702) Shell command executed: sh -c "pkill -9 ekjheory98e || busybox pkill -9 ekjheory98e" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5706) Shell command executed: sh -c "pkill -9 scansh4 || busybox pkill -9 scansh4" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5712) Shell command executed: sh -c "pkill -9 MDMA || busybox pkill -9 MDMA" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5719) Shell command executed: sh -c "pkill -9 fdevalvex || busybox pkill -9 fdevalvex" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5725) Shell command executed: sh -c "pkill -9 scanspc || busybox pkill -9 scanspc" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5729) Shell command executed: sh -c "pkill -9 MELTEDNINJAREALZ || busybox pkill -9 MELTEDNINJAREALZ" Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5739) Shell command executed: sh -c "pkill -9 flexsonskids || busybox pkill -9 flexsonskids"
Source: /tmp/yakuza.arm6.elf (PID: 5746) Shell command executed: sh -c "pkill -9 scanx86 || busybox pkill -9 scanx86"
Source: /tmp/yakuza.arm6.elf (PID: 5750) Shell command executed: sh -c "pkill -9 MISAKI-U79OL || busybox pkill -9 MISAKI-U79OL"
Source: /tmp/yakuza.arm6.elf (PID: 5759) Shell command executed: sh -c "pkill -9 foAxi102kxe || busybox pkill -9 foAxi102kxe"
Source: /tmp/yakuza.arm6.elf (PID: 5766) Shell command executed: sh -c "pkill -9 swodjwodjwoj || busybox pkill -9 swodjwodjwoj"
Source: /tmp/yakuza.arm6.elf (PID: 5778) Shell command executed: sh -c "pkill -9 MmKiy7f87l || busybox pkill -9 MmKiy7f87l"
Source: /tmp/yakuza.arm6.elf (PID: 5785) Shell command executed: sh -c "pkill -9 freecookiex86 || busybox pkill -9 freecookiex86"
Source: /tmp/yakuza.arm6.elf (PID: 5792) Shell command executed: sh -c "pkill -9 sysgpu || busybox pkill -9 sysgpu"
Source: /tmp/yakuza.arm6.elf (PID: 5796) Shell command executed: sh -c "pkill -9 NiGGeR69xd || busybox pkill -9 NiGGeR69xd"
Source: /tmp/yakuza.arm6.elf (PID: 5805) Shell command executed: sh -c "pkill -9 frgege || busybox pkill -9 frgege"
Source: /tmp/yakuza.arm6.elf (PID: 5812) Shell command executed: sh -c "pkill -9 sysupdater || busybox pkill -9 sysupdater"
Source: /tmp/yakuza.arm6.elf (PID: 5818) Shell command executed: sh -c "pkill -9 0DnAzepd || busybox pkill -9 0DnAzepd"
Source: /tmp/yakuza.arm6.elf (PID: 5826) Shell command executed: sh -c "pkill -9 NiGGeRD0nks69 || busybox pkill -9 NiGGeRD0nks69"
Source: /tmp/yakuza.arm6.elf (PID: 5832) Shell command executed: sh -c "pkill -9 frgreu || busybox pkill -9 frgreu"
Source: /tmp/yakuza.arm6.elf (PID: 5836) Shell command executed: sh -c "pkill -9 telnetd || busybox pkill -9 telnetd"
Source: /tmp/yakuza.arm6.elf (PID: 5845) Shell command executed: sh -c "pkill -9 0x766f6964 || busybox pkill -9 0x766f6964"
Source: /tmp/yakuza.arm6.elf (PID: 5849) Shell command executed: sh -c "pkill -9 NiGGeRd0nks1337 || busybox pkill -9 NiGGeRd0nks1337"
Source: /tmp/yakuza.arm6.elf (PID: 5855) Shell command executed: sh -c "pkill -9 gaft || busybox pkill -9 gaft"
Source: /tmp/yakuza.arm6.elf (PID: 5864) Shell command executed: sh -c "pkill -9 urasgbsigboa || busybox pkill -9 urasgbsigboa"
Source: /tmp/yakuza.arm6.elf (PID: 5870) Shell command executed: sh -c "pkill -9 120i3UI49 || busybox pkill -9 120i3UI49"
Source: /tmp/yakuza.arm6.elf (PID: 5876) Shell command executed: sh -c "pkill -9 OaF3 || busybox pkill -9 OaF3"
Source: /tmp/yakuza.arm6.elf (PID: 5880) Shell command executed: sh -c "pkill -9 geae || busybox pkill -9 geae"
Source: /tmp/yakuza.arm6.elf (PID: 5886) Shell command executed: sh -c "pkill -9 vaiolmao || busybox pkill -9 vaiolmao"
Source: /tmp/yakuza.arm6.elf (PID: 5890) Shell command executed: sh -c "pkill -9 123123a || busybox pkill -9 123123a"
Source: /tmp/yakuza.arm6.elf (PID: 5900) Shell command executed: sh -c "pkill -9 Ofurain0n4H34D || busybox pkill -9 Ofurain0n4H34D"
Source: /tmp/yakuza.arm6.elf (PID: 5907) Shell command executed: sh -c "pkill -9 ggTrex || busybox pkill -9 ggTrex"
Source: /tmp/yakuza.arm6.elf (PID: 5913) Shell command executed: sh -c "pkill -9 wasads || busybox pkill -9 wasads"
Source: /tmp/yakuza.arm6.elf (PID: 5920) Shell command executed: sh -c "pkill -9 1293194hjXD || busybox pkill -9 1293194hjXD"
Source: /tmp/yakuza.arm6.elf (PID: 5932) Shell command executed: sh -c "pkill -9 OthLaLosn || busybox pkill -9 OthLaLosn"
Source: /tmp/yakuza.arm6.elf (PID: 5939) Shell command executed: sh -c "pkill -9 ggt || busybox pkill -9 ggt"
Source: /tmp/yakuza.arm6.elf (PID: 5946) Shell command executed: sh -c "pkill -9 wget-log || busybox pkill -9 wget-log"
Source: /tmp/yakuza.arm6.elf (PID: 5952) Shell command executed: sh -c "pkill -9 1337SoraLOADER || busybox pkill -9 1337SoraLOADER"
Source: /tmp/yakuza.arm6.elf (PID: 5959) Shell command executed: sh -c "pkill -9 SAIAKINA || busybox pkill -9 SAIAKINA"
Source: /tmp/yakuza.arm6.elf (PID: 5968) Shell command executed: sh -c "pkill -9 ggtq || busybox pkill -9 ggtq"
Source: /tmp/yakuza.arm6.elf (PID: 5972) Shell command executed: sh -c "pkill -9 1378bfp919GRB1Q2 || busybox pkill -9 1378bfp919GRB1Q2"
Source: /bin/sh (PID: 5598) Pkill executable: /usr/bin/pkill -> pkill -9 902i13 Jump to behavior
Source: /bin/sh (PID: 5636) Pkill executable: /usr/bin/pkill -> pkill -9 BzSxLxBxeY Jump to behavior
Source: /bin/sh (PID: 5642) Pkill executable: /usr/bin/pkill -> pkill -9 HOHO-LUGO7 Jump to behavior
Source: /bin/sh (PID: 5646) Pkill executable: /usr/bin/pkill -> pkill -9 HOHO-U79OL Jump to behavior
Source: /bin/sh (PID: 5655) Pkill executable: /usr/bin/pkill -> pkill -9 JuYfouyf87 Jump to behavior
Source: /bin/sh (PID: 5662) Pkill executable: /usr/bin/pkill -> pkill -9 NiGGeR69xd Jump to behavior
Source: /bin/sh (PID: 5689) Pkill executable: /usr/bin/pkill -> pkill -9 SO190Ij1X Jump to behavior
Source: /bin/sh (PID: 5697) Pkill executable: /usr/bin/pkill -> pkill -9 LOLKIKEEEDDE Jump to behavior
Source: /bin/sh (PID: 5704) Pkill executable: /usr/bin/pkill -> pkill -9 ekjheory98e Jump to behavior
Source: /bin/sh (PID: 5708) Pkill executable: /usr/bin/pkill -> pkill -9 scansh4 Jump to behavior
Source: /bin/sh (PID: 5717) Pkill executable: /usr/bin/pkill -> pkill -9 MDMA Jump to behavior
Source: /bin/sh (PID: 5721) Pkill executable: /usr/bin/pkill -> pkill -9 fdevalvex Jump to behavior
Source: /bin/sh (PID: 5727) Pkill executable: /usr/bin/pkill -> pkill -9 scanspc Jump to behavior
Source: /bin/sh (PID: 5735) Pkill executable: /usr/bin/pkill -> pkill -9 MELTEDNINJAREALZ Jump to behavior
Source: /bin/sh (PID: 5743) Pkill executable: /usr/bin/pkill -> pkill -9 flexsonskids
Source: /bin/sh (PID: 5748) Pkill executable: /usr/bin/pkill -> pkill -9 scanx86
Source: /bin/sh (PID: 5755) Pkill executable: /usr/bin/pkill -> pkill -9 MISAKI-U79OL
Source: /bin/sh (PID: 5764) Pkill executable: /usr/bin/pkill -> pkill -9 foAxi102kxe
Source: /bin/sh (PID: 5772) Pkill executable: /usr/bin/pkill -> pkill -9 swodjwodjwoj
Source: /bin/sh (PID: 5783) Pkill executable: /usr/bin/pkill -> pkill -9 MmKiy7f87l
Source: /bin/sh (PID: 5787) Pkill executable: /usr/bin/pkill -> pkill -9 freecookiex86
Source: /bin/sh (PID: 5794) Pkill executable: /usr/bin/pkill -> pkill -9 sysgpu
Source: /bin/sh (PID: 5801) Pkill executable: /usr/bin/pkill -> pkill -9 NiGGeR69xd
Source: /bin/sh (PID: 5810) Pkill executable: /usr/bin/pkill -> pkill -9 frgege
Source: /bin/sh (PID: 5814) Pkill executable: /usr/bin/pkill -> pkill -9 sysupdater
Source: /bin/sh (PID: 5824) Pkill executable: /usr/bin/pkill -> pkill -9 0DnAzepd
Source: /bin/sh (PID: 5828) Pkill executable: /usr/bin/pkill -> pkill -9 NiGGeRD0nks69
Source: /bin/sh (PID: 5834) Pkill executable: /usr/bin/pkill -> pkill -9 frgreu
Source: /bin/sh (PID: 5840) Pkill executable: /usr/bin/pkill -> pkill -9 telnetd
Source: /bin/sh (PID: 5847) Pkill executable: /usr/bin/pkill -> pkill -9 0x766f6964
Source: /bin/sh (PID: 5851) Pkill executable: /usr/bin/pkill -> pkill -9 NiGGeRd0nks1337
Source: /bin/sh (PID: 5861) Pkill executable: /usr/bin/pkill -> pkill -9 gaft
Source: /bin/sh (PID: 5866) Pkill executable: /usr/bin/pkill -> pkill -9 urasgbsigboa
Source: /bin/sh (PID: 5872) Pkill executable: /usr/bin/pkill -> pkill -9 120i3UI49
Source: /bin/sh (PID: 5878) Pkill executable: /usr/bin/pkill -> pkill -9 OaF3
Source: /bin/sh (PID: 5882) Pkill executable: /usr/bin/pkill -> pkill -9 geae
Source: /bin/sh (PID: 5888) Pkill executable: /usr/bin/pkill -> pkill -9 vaiolmao
Source: /bin/sh (PID: 5896) Pkill executable: /usr/bin/pkill -> pkill -9 123123a
Source: /bin/sh (PID: 5905) Pkill executable: /usr/bin/pkill -> pkill -9 Ofurain0n4H34D
Source: /bin/sh (PID: 5909) Pkill executable: /usr/bin/pkill -> pkill -9 ggTrex
Source: /bin/sh (PID: 5917) Pkill executable: /usr/bin/pkill -> pkill -9 wasads
Source: /bin/sh (PID: 5926) Pkill executable: /usr/bin/pkill -> pkill -9 1293194hjXD
Source: /bin/sh (PID: 5937) Pkill executable: /usr/bin/pkill -> pkill -9 OthLaLosn
Source: /bin/sh (PID: 5942) Pkill executable: /usr/bin/pkill -> pkill -9 ggt
Source: /bin/sh (PID: 5948) Pkill executable: /usr/bin/pkill -> pkill -9 wget-log
Source: /bin/sh (PID: 5957) Pkill executable: /usr/bin/pkill -> pkill -9 1337SoraLOADER
Source: /bin/sh (PID: 5964) Pkill executable: /usr/bin/pkill -> pkill -9 SAIAKINA
Source: /bin/sh (PID: 5970) Pkill executable: /usr/bin/pkill -> pkill -9 ggtq
Source: /bin/sh (PID: 5974) Pkill executable: /usr/bin/pkill -> pkill -9 1378bfp919GRB1Q2
Source: /tmp/yakuza.arm6.elf (PID: 5590) Reads from proc file: /proc/stat Jump to behavior
Source: /tmp/yakuza.arm6.elf (PID: 5620) Reads from proc file: /proc/stat Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: IRC traffic on port 47564 -> 5060
Source: unknown Network traffic detected: IRC traffic on port 47564 -> 5060
Source: /usr/bin/pkill (PID: 5598) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5636) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5642) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5646) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5655) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5662) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5689) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5697) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5704) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5708) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5717) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5721) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5727) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5735) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5743) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5748) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5755) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5764) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5772) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5783) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5787) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5794) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5801) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5810) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5814) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5824) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5828) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5834) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5840) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5847) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5851) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5861) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5866) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5872) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5878) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5882) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5888) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5896) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5905) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5909) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5917) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5926) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5937) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5942) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5948) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5957) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5964) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5970) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 5974) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /tmp/yakuza.arm6.elf (PID: 5580) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5627) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5637) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5643) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5649) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5656) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5663) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5690) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5698) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5705) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5711) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5718) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5722) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5728) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5736) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5745) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5749) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5758) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5765) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5777) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5784) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5789) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5795) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5802) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5811) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5815) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5825) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5831) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5835) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5844) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5848) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5854) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5862) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5869) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5873) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5879) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5885) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5889) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5899) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5906) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5912) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5919) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5931) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5938) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5945) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5949) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5958) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5965) Queries kernel information via 'uname':
Source: /usr/bin/busybox (PID: 5971) Queries kernel information via 'uname':
Source: yakuza.arm6.elf, 5580.1.0000559272be9000.0000559272d17000.rw-.sdmp, yakuza.arm6.elf, 5588.1.0000559272be9000.0000559272d17000.rw-.sdmp, yakuza.arm6.elf, 5620.1.0000559272be9000.0000559272d17000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: yakuza.arm6.elf, 5580.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, yakuza.arm6.elf, 5588.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, yakuza.arm6.elf, 5620.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp Binary or memory string: ax86_64/usr/bin/qemu-arm/tmp/yakuza.arm6.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/yakuza.arm6.elf
Source: yakuza.arm6.elf, 5580.1.0000559272be9000.0000559272d17000.rw-.sdmp, yakuza.arm6.elf, 5588.1.0000559272be9000.0000559272d17000.rw-.sdmp, yakuza.arm6.elf, 5620.1.0000559272be9000.0000559272d17000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: yakuza.arm6.elf, 5580.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, yakuza.arm6.elf, 5588.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, yakuza.arm6.elf, 5620.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: yakuza.arm6.elf, 5588.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp, yakuza.arm6.elf, 5620.1.00007ffcf8bce000.00007ffcf8bef000.rw-.sdmp Binary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:48.0) Gecko/20100101 Firefox/48.0
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; U; Intel Mac OS X; en; rv:1.8.1.11) Gecko/20071128 Camino/1.5.4
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Windows NT 6.1; rv:2.2) Gecko/20110201
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Windows NT 6.1; cs; rv:1.9.2.6) Gecko/20100628 myibrow/4alpha2
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Win 9x 4.90; SG; rv:1.9.2.4) Gecko/20101104 Netscape/9.1.0285
Source: Initial sample User agent string found: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0 Lightning/4.0.2
Source: Initial sample User agent string found: Opera/9.80 (X11; Linux i686; Ubuntu/14.10) Presto/2.12.388 Version/12.16
Source: Initial sample User agent string found: Opera/9.80 (Windows NT 5.1; U;) Presto/2.7.62 Version/11.01
Source: Initial sample User agent string found: Mozilla/5.0 (X11; Linux x86_64; U; de; rv:1.9.1.6) Gecko/20091201 Firefox/3.5.6 Opera 10.62
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Linux; Android 4.4.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.89 Mobile Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:5.0) Gecko/20110517 Firefox/5.0 Fennec/5.0
Source: Initial sample User agent string found: Mozilla/5.0 (Android; Linux armv7l; rv:9.0) Gecko/20111216 Firefox/9.0 Fennec/9.0
Source: Initial sample User agent string found: Mozilla/5.0 (compatible; Teleca Q7; Brew 3.1.5; U; en) 480X800 LGE VX11000
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs