Source: NnDBvZKtdN.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: NnDBvZKtdN.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_3a56423b Author: unknown |
Source: NnDBvZKtdN.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown |
Source: NnDBvZKtdN.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown |
Source: 5513.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5513.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_3a56423b Author: unknown |
Source: 5513.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown |
Source: 5513.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown |
Source: Process Memory Space: NnDBvZKtdN.elf PID: 5513, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: NnDBvZKtdN.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: NnDBvZKtdN.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16 |
Source: NnDBvZKtdN.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26 |
Source: NnDBvZKtdN.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26 |
Source: 5513.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5513.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16 |
Source: 5513.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26 |
Source: 5513.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26 |
Source: Process Memory Space: NnDBvZKtdN.elf PID: 5513, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/1583/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/2672/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/110/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/111/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/112/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/113/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/234/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/1577/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/114/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/235/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/115/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/116/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/117/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/118/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/119/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/10/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/917/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/11/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/12/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/13/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/14/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/15/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/16/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/17/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/18/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/19/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/1593/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/240/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/120/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3094/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/121/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/242/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3406/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/1/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/122/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/243/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/2/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/123/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/244/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/1589/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/124/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/245/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/1588/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/125/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/4/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/246/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3402/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/126/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/5/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/247/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/127/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/6/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/248/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/128/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/7/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/249/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/8/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/129/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/800/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/9/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/801/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3764/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/803/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3765/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3766/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3767/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/20/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/806/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/21/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/807/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/928/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/22/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/23/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/24/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/25/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/26/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/27/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/28/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/29/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3420/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/490/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/250/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/130/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/251/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/131/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/252/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/132/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/253/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/254/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/255/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/135/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/256/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/1599/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/257/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/378/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/258/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/3412/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/259/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/30/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/35/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/1371/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/260/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/261/cmdline |
Jump to behavior |
Source: /tmp/NnDBvZKtdN.elf (PID: 5515) |
File opened: /proc/262/cmdline |
Jump to behavior |