Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.95.169.104 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 251.217.183.134 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.17.223.134 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 148.178.240.80 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 219.252.226.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 219.57.196.190 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 5.242.245.224 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 196.247.197.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 193.82.13.89 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 173.192.169.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 98.158.93.79 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 117.105.14.179 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 207.15.208.173 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 124.231.51.103 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 67.150.128.242 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.186.132.128 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.158.41.245 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 87.177.177.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 60.163.164.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 196.171.108.197 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.194.169.125 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 156.141.138.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 47.94.124.247 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 135.85.131.194 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.46.106.221 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.68.208.13 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.69.56.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 74.54.87.111 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 8.168.250.112 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.124.202.98 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.131.74.214 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 163.122.119.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 58.158.149.6 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 164.27.73.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 85.12.3.251 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 190.175.36.221 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 122.185.221.41 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 126.44.9.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 113.48.16.14 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.58.202.242 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 191.30.109.40 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 4.143.241.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 108.157.22.125 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 189.5.131.107 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 205.178.211.2 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 61.188.207.15 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 187.58.62.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 218.64.28.119 |
Source: sora.sh4.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: sora.sh4.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6258.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6258.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6256.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6256.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6373.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6373.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6377.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6377.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6265.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6265.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6259.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6259.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6370.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6370.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6391.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6391.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6256, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6256, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6258, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6258, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6265, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6265, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6370, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6370, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6373, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6373, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6377, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.sh4.elf PID: 6377, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: sora.sh4.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: sora.sh4.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6258.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6258.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6256.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6256.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6373.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6373.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6377.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6377.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6265.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6265.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6259.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6259.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6370.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6370.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6391.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6391.1.00007fbcb8400000.00007fbcb8410000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6256, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6256, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6258, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6258, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6265, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6265, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6370, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6370, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6373, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6373, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6377, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.sh4.elf PID: 6377, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/491/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/793/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/772/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/796/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/774/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/797/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/777/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/799/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/658/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/912/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/759/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/936/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/918/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/1/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/761/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/785/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/884/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/720/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/721/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/788/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/789/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/800/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/801/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/847/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6264) |
File opened: /proc/904/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/491/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/793/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/772/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/796/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/774/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/797/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/777/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/799/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/658/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/912/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/759/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/936/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/918/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/1/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/761/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/785/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/884/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/720/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/721/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/788/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/789/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/800/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/801/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/847/fd |
Jump to behavior |
Source: /tmp/sora.sh4.elf (PID: 6258) |
File opened: /proc/904/fd |
Jump to behavior |
Source: sora.sh4.elf, 6256.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6258.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6370.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6391.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6377.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6259.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6373.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6265.1.00007ffe83168000.00007ffe83189000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-sh4 |
Source: sora.sh4.elf, 6256.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6258.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6370.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6391.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6377.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6259.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6373.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6265.1.000055c89c033000.000055c89c096000.rw-.sdmp |
Binary or memory string: U5!/etc/qemu-binfmt/sh4 |
Source: sora.sh4.elf, 6256.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6258.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6370.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6391.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6377.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6259.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6373.1.000055c89c033000.000055c89c096000.rw-.sdmp, sora.sh4.elf, 6265.1.000055c89c033000.000055c89c096000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/sh4 |
Source: sora.sh4.elf, 6256.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6258.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6370.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6391.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6377.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6259.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6373.1.00007ffe83168000.00007ffe83189000.rw-.sdmp, sora.sh4.elf, 6265.1.00007ffe83168000.00007ffe83189000.rw-.sdmp |
Binary or memory string: x86_64/usr/bin/qemu-sh4/tmp/sora.sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sora.sh4.elf |