Source: zznAzmTdd6.elf |
ReversingLabs: Detection: 70% |
Source: global traffic |
TCP traffic: 192.168.2.13:52058 -> 209.14.69.249:666 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.14.69.249 |
Source: ELF static info symbol of initial sample |
Name: attack.c |
Source: ELF static info symbol of initial sample |
Name: attack_get_opt_int |
Source: ELF static info symbol of initial sample |
Name: attack_get_opt_ip |
Source: ELF static info symbol of initial sample |
Name: attack_get_opt_str |
Source: ELF static info symbol of initial sample |
Name: attack_icmpecho |
Source: ELF static info symbol of initial sample |
Name: attack_init |
Source: ELF static info symbol of initial sample |
Name: attack_method.c |
Source: ELF static info symbol of initial sample |
Name: attack_method_bypass |
Source: ELF static info symbol of initial sample |
Name: attack_method_greeth |
Source: ELF static info symbol of initial sample |
Name: attack_method_greip |
Source: zznAzmTdd6.elf |
ELF static info symbol of initial sample: __gnu_unwind_execute |
Source: classification engine |
Classification label: mal68.troj.linELF@0/0@0/0 |
Source: /tmp/zznAzmTdd6.elf (PID: 5468) |
Queries kernel information via 'uname': |
Jump to behavior |
Source: zznAzmTdd6.elf, 5468.1.000055e65fe84000.000055e65ffd5000.rw-.sdmp, zznAzmTdd6.elf, 5471.1.000055e65fe84000.000055e65ffb2000.rw-.sdmp, zznAzmTdd6.elf, 5475.1.000055e65fe84000.000055e65ffb2000.rw-.sdmp |
Binary or memory string: U!/etc/qemu-binfmt/arm |
Source: zznAzmTdd6.elf, 5468.1.00007ffe36601000.00007ffe36622000.rw-.sdmp, zznAzmTdd6.elf, 5471.1.00007ffe36601000.00007ffe36622000.rw-.sdmp, zznAzmTdd6.elf, 5475.1.00007ffe36601000.00007ffe36622000.rw-.sdmp |
Binary or memory string: XEx86_64/usr/bin/qemu-arm/tmp/zznAzmTdd6.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/zznAzmTdd6.elf |
Source: zznAzmTdd6.elf, 5468.1.000055e65fe84000.000055e65ffd5000.rw-.sdmp, zznAzmTdd6.elf, 5471.1.000055e65fe84000.000055e65ffb2000.rw-.sdmp, zznAzmTdd6.elf, 5475.1.000055e65fe84000.000055e65ffb2000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/arm |
Source: zznAzmTdd6.elf, 5468.1.00007ffe36601000.00007ffe36622000.rw-.sdmp, zznAzmTdd6.elf, 5471.1.00007ffe36601000.00007ffe36622000.rw-.sdmp, zznAzmTdd6.elf, 5475.1.00007ffe36601000.00007ffe36622000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-arm |
Source: Yara match |
File source: zznAzmTdd6.elf, type: SAMPLE |
Source: Yara match |
File source: zznAzmTdd6.elf, type: SAMPLE |