Linux Analysis Report
4NnBaAMXoc.elf

Overview

General Information

Sample name: 4NnBaAMXoc.elf
renamed because original name is a hash value
Original sample name: 88b544637baebebd8e3b79de207cdfb5.elf
Analysis ID: 1432399
MD5: 88b544637baebebd8e3b79de207cdfb5
SHA1: 7398ac64a9218278a93307f4f748437f5327c26f
SHA256: d9ff1d4c4dd8b2b46f8ccc7464e589ff486df462f472c3baacb4748702931185
Tags: 32armelfgafgyt
Infos:

Detection

Mirai, Moobot, Okiru
Score: 100
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Mirai
Yara detected Moobot
Yara detected Okiru
Sample deletes itself
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Sample and/or dropped files contains symbols with suspicious names
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Mirai Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
Name Description Attribution Blogpost URLs Link
MooBot No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot

AV Detection

barindex
Source: 4NnBaAMXoc.elf Avira: detected
Source: 4NnBaAMXoc.elf ReversingLabs: Detection: 65%

Networking

barindex
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.13:58840 -> 200.48.94.9:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.13:58962 -> 200.48.94.9:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.13:44970 -> 119.201.111.138:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.13:45196 -> 190.166.153.243:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.13:59380 -> 200.48.94.9:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.13:59498 -> 200.48.94.9:23
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51838
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51838
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51844
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51866
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51888
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51902
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51922
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51940
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51962
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51972
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51986
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51998
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52006
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52016
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52032
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52046
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52052
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52062
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52070
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52080
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52088
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52094
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52106
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52116
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52128
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52138
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52148
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52162
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36608
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36608
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36618
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36628
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36634
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36644
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36654
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52174
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36664
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52230
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36678
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52242
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36688
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36698
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36704
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36712
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36718
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36724
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36726
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36732
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36736
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36738
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36742
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36744
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36764
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36770
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36780
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36784
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36796
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36802
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36810
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36818
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36824
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36828
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57038
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57038
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57054
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57086
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57096
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57104
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57120
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57132
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57150
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57186
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57206
Source: global traffic TCP traffic: 192.168.2.13:35044 -> 45.131.111.251:59666
Source: /tmp/4NnBaAMXoc.elf (PID: 5432) Socket: 127.0.0.1::52380 Jump to behavior
Source: unknown TCP traffic detected without corresponding DNS query: 126.77.9.252
Source: unknown TCP traffic detected without corresponding DNS query: 31.253.193.253
Source: unknown TCP traffic detected without corresponding DNS query: 159.13.14.252
Source: unknown TCP traffic detected without corresponding DNS query: 167.65.139.177
Source: unknown TCP traffic detected without corresponding DNS query: 194.80.252.237
Source: unknown TCP traffic detected without corresponding DNS query: 114.204.70.186
Source: unknown TCP traffic detected without corresponding DNS query: 211.143.49.145
Source: unknown TCP traffic detected without corresponding DNS query: 44.148.32.21
Source: unknown TCP traffic detected without corresponding DNS query: 95.2.113.2
Source: unknown TCP traffic detected without corresponding DNS query: 132.100.20.225
Source: unknown TCP traffic detected without corresponding DNS query: 94.138.43.139
Source: unknown TCP traffic detected without corresponding DNS query: 139.117.21.132
Source: unknown TCP traffic detected without corresponding DNS query: 78.35.246.66
Source: unknown TCP traffic detected without corresponding DNS query: 132.34.53.147
Source: unknown TCP traffic detected without corresponding DNS query: 192.218.191.149
Source: unknown TCP traffic detected without corresponding DNS query: 216.59.138.161
Source: unknown TCP traffic detected without corresponding DNS query: 48.29.251.66
Source: unknown TCP traffic detected without corresponding DNS query: 65.37.160.55
Source: unknown TCP traffic detected without corresponding DNS query: 199.208.201.35
Source: unknown TCP traffic detected without corresponding DNS query: 197.121.6.246
Source: unknown TCP traffic detected without corresponding DNS query: 134.147.148.40
Source: unknown TCP traffic detected without corresponding DNS query: 73.177.0.251
Source: unknown TCP traffic detected without corresponding DNS query: 35.150.38.131
Source: unknown TCP traffic detected without corresponding DNS query: 164.85.112.42
Source: unknown TCP traffic detected without corresponding DNS query: 156.166.11.131
Source: unknown TCP traffic detected without corresponding DNS query: 135.136.228.183
Source: unknown TCP traffic detected without corresponding DNS query: 156.132.69.108
Source: unknown TCP traffic detected without corresponding DNS query: 131.81.8.185
Source: unknown TCP traffic detected without corresponding DNS query: 155.192.150.61
Source: unknown TCP traffic detected without corresponding DNS query: 32.20.29.239
Source: unknown TCP traffic detected without corresponding DNS query: 62.47.128.5
Source: unknown TCP traffic detected without corresponding DNS query: 61.58.11.140
Source: unknown TCP traffic detected without corresponding DNS query: 25.234.143.203
Source: unknown TCP traffic detected without corresponding DNS query: 81.142.167.72
Source: unknown TCP traffic detected without corresponding DNS query: 200.22.97.97
Source: unknown TCP traffic detected without corresponding DNS query: 139.124.76.37
Source: unknown TCP traffic detected without corresponding DNS query: 17.123.114.211
Source: unknown TCP traffic detected without corresponding DNS query: 109.159.98.169
Source: unknown TCP traffic detected without corresponding DNS query: 171.34.247.52
Source: unknown TCP traffic detected without corresponding DNS query: 122.54.161.6
Source: unknown TCP traffic detected without corresponding DNS query: 161.43.226.20
Source: unknown TCP traffic detected without corresponding DNS query: 79.251.151.138
Source: unknown TCP traffic detected without corresponding DNS query: 171.94.86.123
Source: unknown TCP traffic detected without corresponding DNS query: 190.244.138.155
Source: unknown TCP traffic detected without corresponding DNS query: 54.80.40.185
Source: unknown TCP traffic detected without corresponding DNS query: 94.88.112.37
Source: unknown TCP traffic detected without corresponding DNS query: 2.173.91.32
Source: unknown TCP traffic detected without corresponding DNS query: 153.188.123.74
Source: unknown TCP traffic detected without corresponding DNS query: 156.87.161.187
Source: unknown TCP traffic detected without corresponding DNS query: 150.26.220.23

System Summary

barindex
Source: 4NnBaAMXoc.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 4NnBaAMXoc.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_0bce98a2 Author: unknown
Source: 5432.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5432.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_0bce98a2 Author: unknown
Source: 5436.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5436.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_0bce98a2 Author: unknown
Source: Process Memory Space: 4NnBaAMXoc.elf PID: 5432, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 4NnBaAMXoc.elf PID: 5436, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 4NnBaAMXoc.elf ELF static info symbol of initial sample: __gnu_unwind_execute
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: /proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-serverusr/shellmnt/sys/bin/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spoolsshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
Source: 4NnBaAMXoc.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 4NnBaAMXoc.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_0bce98a2 reference_sample = 1b20df8df7f84ad29d81ccbe276f49a6488c2214077b13da858656c027531c80, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 993d0d2e24152d0fb72cc5d5add395bed26671c3935f73386341398b91cb0e6e, id = 0bce98a2-113e-41e1-95c9-9e1852b26142, last_modified = 2021-09-16
Source: 5432.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5432.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_0bce98a2 reference_sample = 1b20df8df7f84ad29d81ccbe276f49a6488c2214077b13da858656c027531c80, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 993d0d2e24152d0fb72cc5d5add395bed26671c3935f73386341398b91cb0e6e, id = 0bce98a2-113e-41e1-95c9-9e1852b26142, last_modified = 2021-09-16
Source: 5436.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5436.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_0bce98a2 reference_sample = 1b20df8df7f84ad29d81ccbe276f49a6488c2214077b13da858656c027531c80, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 993d0d2e24152d0fb72cc5d5add395bed26671c3935f73386341398b91cb0e6e, id = 0bce98a2-113e-41e1-95c9-9e1852b26142, last_modified = 2021-09-16
Source: Process Memory Space: 4NnBaAMXoc.elf PID: 5432, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 4NnBaAMXoc.elf PID: 5436, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engine Classification label: mal100.troj.evad.linELF@0/0@0/0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/4NnBaAMXoc.elf (PID: 5432) File: /tmp/4NnBaAMXoc.elf Jump to behavior
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51838
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51838
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51844
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51866
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51888
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51902
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51922
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51940
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51962
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51972
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51986
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 51998
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52006
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52016
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52032
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52046
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52052
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52062
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52070
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52080
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52088
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52094
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52106
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52116
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52128
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52138
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52148
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52162
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36608
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36608
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36618
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36628
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36634
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36644
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36654
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52174
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36664
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52230
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36678
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 52242
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36688
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36698
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36704
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36712
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36718
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36724
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36726
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36732
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36736
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36738
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36742
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36744
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36764
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36770
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36780
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36784
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36796
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36802
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36810
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36818
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36824
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 36828
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57038
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57038
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57054
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57086
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57096
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57104
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57120
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57132
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57150
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57186
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57206
Source: /tmp/4NnBaAMXoc.elf (PID: 5432) Queries kernel information via 'uname': Jump to behavior
Source: 4NnBaAMXoc.elf, 5432.1.0000564a561fc000.0000564a5634d000.rw-.sdmp, 4NnBaAMXoc.elf, 5436.1.0000564a561fc000.0000564a5632a000.rw-.sdmp Binary or memory string: 3!VJVP5!VJVP2!VJV!/etc/qemu-binfmt/arm
Source: 4NnBaAMXoc.elf, 5432.1.00007ffe4e264000.00007ffe4e285000.rw-.sdmp, 4NnBaAMXoc.elf, 5436.1.00007ffe4e264000.00007ffe4e285000.rw-.sdmp Binary or memory string: Px86_64/usr/bin/qemu-arm/tmp/4NnBaAMXoc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/4NnBaAMXoc.elf
Source: 4NnBaAMXoc.elf, 5432.1.0000564a561fc000.0000564a5634d000.rw-.sdmp, 4NnBaAMXoc.elf, 5436.1.0000564a561fc000.0000564a5632a000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: 4NnBaAMXoc.elf, 5432.1.00007ffe4e264000.00007ffe4e285000.rw-.sdmp, 4NnBaAMXoc.elf, 5436.1.00007ffe4e264000.00007ffe4e285000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm

Stealing of Sensitive Information

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 4NnBaAMXoc.elf, type: SAMPLE
Source: Yara match File source: 4NnBaAMXoc.elf, type: SAMPLE
Source: Yara match File source: 5432.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5436.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 4NnBaAMXoc.elf PID: 5432, type: MEMORYSTR
Source: Yara match File source: 4NnBaAMXoc.elf, type: SAMPLE
Source: Yara match File source: 5432.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5436.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 4NnBaAMXoc.elf PID: 5432, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 4NnBaAMXoc.elf PID: 5436, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 4NnBaAMXoc.elf, type: SAMPLE
Source: Yara match File source: 4NnBaAMXoc.elf, type: SAMPLE
Source: Yara match File source: 5432.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5436.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 4NnBaAMXoc.elf PID: 5432, type: MEMORYSTR
Source: Yara match File source: 4NnBaAMXoc.elf, type: SAMPLE
Source: Yara match File source: 5432.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5436.1.00007f349c017000.00007f349c034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 4NnBaAMXoc.elf PID: 5432, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 4NnBaAMXoc.elf PID: 5436, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs