Linux Analysis Report
x86.elf

Overview

General Information

Sample name: x86.elf
Analysis ID: 1427778
MD5: 7c2da8202951debe176fc47541ae754c
SHA1: ed011df676af41489ef38213af10b5c70831ec0d
SHA256: eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d
Infos:

Detection

Mirai
Score: 84
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Mirai
Machine Learning detection for sample
Sample is packed with UPX
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Mirai Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai

AV Detection

barindex
Source: x86.elf ReversingLabs: Detection: 34%
Source: x86.elf Virustotal: Detection: 35% Perma Link
Source: x86.elf Joe Sandbox ML: detected

Networking

barindex
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:48516 -> 181.23.214.61:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:53504 -> 64.76.197.233:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:39442 -> 89.121.199.33:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:46900 -> 190.176.116.75:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:35734 -> 221.219.244.77:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:56102 -> 64.76.197.233:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:47668 -> 112.198.18.250:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:51864 -> 186.62.125.120:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:53610 -> 81.133.110.36:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:44942 -> 90.188.9.64:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.14:54248 -> 190.50.37.154:23
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40556
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40586
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40598
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40602
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40606
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40602
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40612
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40620
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40814
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46692
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46702
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46722
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46744
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40832
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46760
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46778
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46796
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46808
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46818
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46830
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46844
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46858
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46872
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46890
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46908
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46920
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46940
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46952
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46970
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46990
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47006
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40954
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47032
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47052
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41228
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47084
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41264
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47108
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41294
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47140
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47166
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41294
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47188
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41326
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41460
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41486
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41498
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41512
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41528
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41548
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41548
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41568
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41682
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41702
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41726
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41726
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41746
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41786
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41810
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41834
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41714
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41724
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41728
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41736
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41748
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41752
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41758
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41762
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41770
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41772
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41778
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41792
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41798
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41814
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41822
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41836
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41846
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41860
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41870
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41882
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41896
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41910
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41922
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41934
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41950
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41962
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41982
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 42004
Source: global traffic TCP traffic: 192.168.2.14:46230 -> 91.92.250.136:11025
Source: unknown TCP traffic detected without corresponding DNS query: 64.177.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 126.208.146.81
Source: unknown TCP traffic detected without corresponding DNS query: 150.242.173.191
Source: unknown TCP traffic detected without corresponding DNS query: 184.42.161.179
Source: unknown TCP traffic detected without corresponding DNS query: 164.106.246.158
Source: unknown TCP traffic detected without corresponding DNS query: 40.234.156.228
Source: unknown TCP traffic detected without corresponding DNS query: 220.166.47.243
Source: unknown TCP traffic detected without corresponding DNS query: 111.254.132.238
Source: unknown TCP traffic detected without corresponding DNS query: 61.249.208.81
Source: unknown TCP traffic detected without corresponding DNS query: 219.25.239.220
Source: unknown TCP traffic detected without corresponding DNS query: 171.18.176.101
Source: unknown TCP traffic detected without corresponding DNS query: 27.121.130.175
Source: unknown TCP traffic detected without corresponding DNS query: 179.163.92.11
Source: unknown TCP traffic detected without corresponding DNS query: 181.146.203.53
Source: unknown TCP traffic detected without corresponding DNS query: 16.149.143.81
Source: unknown TCP traffic detected without corresponding DNS query: 192.187.242.174
Source: unknown TCP traffic detected without corresponding DNS query: 143.25.171.47
Source: unknown TCP traffic detected without corresponding DNS query: 78.202.223.138
Source: unknown TCP traffic detected without corresponding DNS query: 42.75.160.84
Source: unknown TCP traffic detected without corresponding DNS query: 1.79.49.177
Source: unknown TCP traffic detected without corresponding DNS query: 107.43.197.186
Source: unknown TCP traffic detected without corresponding DNS query: 208.50.149.132
Source: unknown TCP traffic detected without corresponding DNS query: 102.32.124.211
Source: unknown TCP traffic detected without corresponding DNS query: 164.190.36.255
Source: unknown TCP traffic detected without corresponding DNS query: 111.137.143.4
Source: unknown TCP traffic detected without corresponding DNS query: 150.241.228.75
Source: unknown TCP traffic detected without corresponding DNS query: 160.96.176.120
Source: unknown TCP traffic detected without corresponding DNS query: 203.230.233.118
Source: unknown TCP traffic detected without corresponding DNS query: 156.74.78.2
Source: unknown TCP traffic detected without corresponding DNS query: 146.29.97.133
Source: unknown TCP traffic detected without corresponding DNS query: 53.167.58.155
Source: unknown TCP traffic detected without corresponding DNS query: 108.64.190.79
Source: unknown TCP traffic detected without corresponding DNS query: 185.35.55.39
Source: unknown TCP traffic detected without corresponding DNS query: 153.15.52.204
Source: unknown TCP traffic detected without corresponding DNS query: 187.35.208.127
Source: unknown TCP traffic detected without corresponding DNS query: 159.88.24.181
Source: unknown TCP traffic detected without corresponding DNS query: 151.13.95.210
Source: unknown TCP traffic detected without corresponding DNS query: 217.65.9.228
Source: unknown TCP traffic detected without corresponding DNS query: 186.70.180.49
Source: unknown TCP traffic detected without corresponding DNS query: 108.195.208.129
Source: unknown TCP traffic detected without corresponding DNS query: 166.245.46.222
Source: unknown TCP traffic detected without corresponding DNS query: 75.221.225.64
Source: unknown TCP traffic detected without corresponding DNS query: 223.157.168.130
Source: unknown TCP traffic detected without corresponding DNS query: 119.31.104.95
Source: unknown TCP traffic detected without corresponding DNS query: 197.205.176.5
Source: unknown TCP traffic detected without corresponding DNS query: 170.43.53.236
Source: unknown TCP traffic detected without corresponding DNS query: 53.61.147.134
Source: unknown TCP traffic detected without corresponding DNS query: 16.106.226.38
Source: unknown TCP traffic detected without corresponding DNS query: 83.128.120.11
Source: unknown TCP traffic detected without corresponding DNS query: 97.84.251.28
Source: unknown DNS traffic detected: queries for: daisy.ubuntu.com
Source: x86.elf String found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: LOAD without section mappings Program segment: 0x8048000
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5515.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5513.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5519.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5510.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5514.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engine Classification label: mal84.troj.evad.linELF@0/0@2/0

Data Obfuscation

barindex
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Id: UPX 3.96 Copyright (C) 1996-2020 the UPX Team. All Rights Reserved. $

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40556
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40586
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40598
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40602
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40606
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40602
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40612
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40620
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40814
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46692
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46702
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46722
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46744
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40832
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46760
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46778
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46796
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46808
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46818
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46830
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46844
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46858
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46872
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46890
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46908
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46920
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46940
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46952
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46970
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 46990
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47006
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40954
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47032
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47052
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41228
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47084
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41264
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47108
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41294
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47140
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47166
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41294
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 47188
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41326
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41460
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41486
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41498
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41512
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41528
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41548
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41548
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41568
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41682
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41702
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41726
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41726
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41746
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41786
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41810
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41834
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41714
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41724
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41728
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41736
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41748
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41752
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41758
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41762
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41770
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41772
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41778
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41792
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41798
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41814
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41822
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41836
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41846
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41860
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41870
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41882
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41896
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41910
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41922
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41934
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41950
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41962
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41982
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 42004
Source: x86.elf Submission file: segment LOAD with 7.9429 entropy (max. 8.0)

Stealing of Sensitive Information

barindex
Source: Yara match File source: dump.pcap, type: PCAP

Remote Access Functionality

barindex
Source: Yara match File source: dump.pcap, type: PCAP
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs