Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
g4jUx3nLmP.elf

Overview

General Information

Sample name:g4jUx3nLmP.elf
renamed because original name is a hash value
Original sample name:3580505a73f0eb1548db93a2cb775b67.elf
Analysis ID:1438520
MD5:3580505a73f0eb1548db93a2cb775b67
SHA1:1f6a20d3407fdd4c714280b4ed744bb93ed8ecbd
SHA256:f76b23ba369ba7575cbc85a562b0b1ae52ba1661ef13d05b679f7eb39beda2f6
Tags:64elfmirai
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1438520
Start date and time:2024-05-08 20:12:03 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:g4jUx3nLmP.elf
renamed because original name is a hash value
Original Sample Name:3580505a73f0eb1548db93a2cb775b67.elf
Detection:MAL
Classification:mal64.troj.linELF@0/0@1/0
  • VT rate limit hit for: g4jUx3nLmP.elf
Command:/tmp/g4jUx3nLmP.elf
PID:5472
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
xXxSlicexXxxVEGA.
Standard Error:
  • system is lnxubuntu20
  • cleanup
SourceRuleDescriptionAuthorStrings
g4jUx3nLmP.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xb978:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
g4jUx3nLmP.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xc167:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
g4jUx3nLmP.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0xad72:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0xae80:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
g4jUx3nLmP.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xbd27:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
g4jUx3nLmP.elfLinux_Trojan_Gafgyt_0cd591cdunknownunknown
  • 0xb5b6:$a: 4E F8 48 8D 4E D8 49 8D 42 E0 48 83 C7 03 EB 6B 4C 8B 46 F8 48 8D
Click to see the 6 entries
SourceRuleDescriptionAuthorStrings
5472.1.0000000000400000.000000000040f000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xb978:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5472.1.0000000000400000.000000000040f000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xc167:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5472.1.0000000000400000.000000000040f000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0xad72:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0xae80:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5472.1.0000000000400000.000000000040f000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xbd27:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
5472.1.0000000000400000.000000000040f000.r-x.sdmpLinux_Trojan_Gafgyt_0cd591cdunknownunknown
  • 0xb5b6:$a: 4E F8 48 8D 4E D8 49 8D 42 E0 48 83 C7 03 EB 6B 4C 8B 46 F8 48 8D
Click to see the 28 entries
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: g4jUx3nLmP.elfReversingLabs: Detection: 55%
Source: g4jUx3nLmP.elfJoe Sandbox ML: detected

Networking

barindex
Source: global trafficTCP traffic: 91.92.244.58 ports 0,1,5,6,9,60195
Source: global trafficTCP traffic: 192.168.2.13:51468 -> 91.92.244.58:60195
Source: /tmp/g4jUx3nLmP.elf (PID: 5472)Socket: 127.0.0.1::63841Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 58.237.34.46
Source: global trafficDNS traffic detected: DNS query: minuoddos.top

System Summary

barindex
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: g4jUx3nLmP.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5472.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5473.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5475.1.0000000000400000.000000000040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: classification engineClassification label: mal64.troj.linELF@0/0@1/0
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3122/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3117/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3114/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/914/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/518/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/519/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/917/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3134/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3132/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3095/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1745/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1866/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1588/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/884/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1982/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/765/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/767/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/800/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1906/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/802/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/803/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1748/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1482/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/490/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1480/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1755/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1238/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1875/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1751/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1872/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/2961/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1475/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/656/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/778/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/657/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/658/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/659/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/418/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/936/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/419/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/816/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1879/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1891/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3153/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/780/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/660/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1921/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/783/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1765/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/2974/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1400/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1884/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/2972/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3147/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/2970/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1881/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3146/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1805/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1925/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1804/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1648/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1922/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3165/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3164/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3163/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3162/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/790/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3161/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/792/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/793/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/672/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1930/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/674/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/795/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1411/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/2984/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1410/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/797/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/676/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3158/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/678/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/679/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3170/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/680/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3208/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1940/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3203/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/726/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/727/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1946/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1944/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3209/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3181/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/2496/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3100/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3220/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3185/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3183/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3182/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1832/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1432/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/3212/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/855/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/2926/mapsJump to behavior
Source: /tmp/g4jUx3nLmP.elf (PID: 5476)File opened: /proc/1691/mapsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
g4jUx3nLmP.elf55%ReversingLabsLinux.Trojan.Mirai
g4jUx3nLmP.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
minuoddos.top
91.92.244.58
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    58.237.34.46
    unknownKorea Republic of
    9318SKB-ASSKBroadbandCoLtdKRfalse
    91.92.244.58
    minuoddos.topBulgaria
    34368THEZONEBGtrue
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    91.92.244.58JupQoUiGIu.elfGet hashmaliciousUnknownBrowse
      mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        minuoddos.topJupQoUiGIu.elfGet hashmaliciousUnknownBrowse
        • 91.92.244.58
        mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
        • 91.92.244.58
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        THEZONEBGJupQoUiGIu.elfGet hashmaliciousUnknownBrowse
        • 91.92.244.58
        mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
        • 91.92.244.58
        z51ComprobantedePago.exeGet hashmaliciousXenoRATBrowse
        • 91.92.243.131
        Comprobante.exeGet hashmaliciousXenoRATBrowse
        • 91.92.243.131
        SecuriteInfo.com.Trojan.PackedNET.2147.22278.5618.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
        • 91.92.253.28
        VT3czLymhe.exeGet hashmaliciousUnknownBrowse
        • 91.92.253.114
        Comprobante.exeGet hashmaliciousXenoRATBrowse
        • 91.92.243.131
        download.elfGet hashmaliciousUnknownBrowse
        • 91.92.245.104
        Odeme_belgesi.exeGet hashmaliciousXenoRATBrowse
        • 91.92.243.131
        Odeme_belgesi.exeGet hashmaliciousXenoRATBrowse
        • 91.92.243.131
        SKB-ASSKBroadbandCoLtdKRYvPa06OoUd.elfGet hashmaliciousMiraiBrowse
        • 218.52.46.244
        TV7RLVOmvl.elfGet hashmaliciousMiraiBrowse
        • 58.126.30.151
        X7oMmXD99L.elfGet hashmaliciousMiraiBrowse
        • 219.255.193.223
        4ZgjosOSkq.elfGet hashmaliciousMiraiBrowse
        • 219.248.255.89
        240506-b7lv1sfmcw_pw_infected.zipGet hashmaliciousXmrigBrowse
        • 175.125.176.180
        240506-b7lv1sfmcw_pw_infected.zipGet hashmaliciousXmrigBrowse
        • 222.236.132.76
        5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.zipGet hashmaliciousXmrigBrowse
        • 211.203.192.131
        YLvVXuRyhA.elfGet hashmaliciousMiraiBrowse
        • 114.200.136.245
        bot.mips.elfGet hashmaliciousUnknownBrowse
        • 175.121.90.82
        bot.arm.elfGet hashmaliciousMiraiBrowse
        • 180.69.52.247
        No context
        No context
        No created / dropped files found
        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
        Entropy (8bit):6.129336230288326
        TrID:
        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
        File name:g4jUx3nLmP.elf
        File size:62'304 bytes
        MD5:3580505a73f0eb1548db93a2cb775b67
        SHA1:1f6a20d3407fdd4c714280b4ed744bb93ed8ecbd
        SHA256:f76b23ba369ba7575cbc85a562b0b1ae52ba1661ef13d05b679f7eb39beda2f6
        SHA512:ebeb7c91cce67020837b14fadf1310b71406eb6209668d6024eba10da94a7ef24395ff3b7b9a73fc7fea174eac304d87cb4e930de03092530ec449d105c4067e
        SSDEEP:1536:ESEKY4Jzjw+Qld5UIqZEZtY+fq+1dHwRqRe0Hcl2/:m+s+Qj5UIqZEZtjfqcQRqRexl2
        TLSH:D3532907BD4489EDC149D138477BB63AC52631BD123CB2DB7BE4FE275C46EA11A2C889
        File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@.....`.......`.......................h.......h.P.....h.P.....8.......................Q.td....................................................H...._........H........

        ELF header

        Class:ELF64
        Data:2's complement, little endian
        Version:1 (current)
        Machine:Advanced Micro Devices X86-64
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - System V
        ABI Version:0
        Entry Point Address:0x400194
        Flags:0x0
        ELF Header Size:64
        Program Header Offset:64
        Program Header Size:56
        Number of Program Headers:3
        Section Header Offset:61664
        Section Header Size:64
        Number of Section Headers:10
        Header String Table Index:9
        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
        NULL0x00x00x00x00x0000
        .initPROGBITS0x4000e80xe80x130x00x6AX001
        .textPROGBITS0x4001000x1000xde460x00x6AX0016
        .finiPROGBITS0x40df460xdf460xe0x00x6AX001
        .rodataPROGBITS0x40df600xdf600xf000x00x2A0032
        .ctorsPROGBITS0x50ee680xee680x100x00x3WA008
        .dtorsPROGBITS0x50ee780xee780x100x00x3WA008
        .dataPROGBITS0x50eea00xeea00x2000x00x3WA0032
        .bssNOBITS0x50f0a00xf0a00xe680x00x3WA0032
        .shstrtabSTRTAB0x00xf0a00x3e0x00x0001
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x4000000x4000000xee600xee606.17660x5R E0x100000.init .text .fini .rodata
        LOAD0xee680x50ee680x50ee680x2380x10a02.94740x6RW 0x100000.ctors .dtors .data .bss
        GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
        TimestampSource PortDest PortSource IPDest IP
        May 8, 2024 20:13:04.367444038 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:13:04.670006037 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:13:04.670192957 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:13:04.670248985 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:13:04.972475052 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:13:04.972621918 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:13:05.274899006 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:13:09.512113094 CEST235749658.237.34.46192.168.2.13
        May 8, 2024 20:13:09.512356997 CEST5749623192.168.2.1358.237.34.46
        May 8, 2024 20:13:14.680397034 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:13:14.983423948 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:13:14.983444929 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:13:14.983551025 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:13:30.308015108 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:13:30.308157921 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:13:45.613121033 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:13:45.613244057 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:14:00.917015076 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:14:00.917184114 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:14:15.044063091 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:14:15.346529007 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:14:15.346681118 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:14:30.660867929 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:14:30.660949945 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:14:45.963999033 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:14:45.964149952 CEST5146860195192.168.2.1391.92.244.58
        May 8, 2024 20:15:01.267035961 CEST601955146891.92.244.58192.168.2.13
        May 8, 2024 20:15:01.267286062 CEST5146860195192.168.2.1391.92.244.58
        TimestampSource PortDest PortSource IPDest IP
        May 8, 2024 20:13:04.196964025 CEST5407153192.168.2.138.8.8.8
        May 8, 2024 20:13:04.367213011 CEST53540718.8.8.8192.168.2.13
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        May 8, 2024 20:13:04.196964025 CEST192.168.2.138.8.8.80x9d71Standard query (0)minuoddos.topA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        May 8, 2024 20:13:04.367213011 CEST8.8.8.8192.168.2.130x9d71No error (0)minuoddos.top91.92.244.58A (IP address)IN (0x0001)false

        System Behavior

        Start time (UTC):18:13:03
        Start date (UTC):08/05/2024
        Path:/tmp/g4jUx3nLmP.elf
        Arguments:/tmp/g4jUx3nLmP.elf
        File size:62304 bytes
        MD5 hash:3580505a73f0eb1548db93a2cb775b67

        Start time (UTC):18:13:03
        Start date (UTC):08/05/2024
        Path:/tmp/g4jUx3nLmP.elf
        Arguments:-
        File size:62304 bytes
        MD5 hash:3580505a73f0eb1548db93a2cb775b67

        Start time (UTC):18:13:03
        Start date (UTC):08/05/2024
        Path:/tmp/g4jUx3nLmP.elf
        Arguments:-
        File size:62304 bytes
        MD5 hash:3580505a73f0eb1548db93a2cb775b67

        Start time (UTC):18:13:03
        Start date (UTC):08/05/2024
        Path:/tmp/g4jUx3nLmP.elf
        Arguments:-
        File size:62304 bytes
        MD5 hash:3580505a73f0eb1548db93a2cb775b67

        Start time (UTC):18:13:03
        Start date (UTC):08/05/2024
        Path:/tmp/g4jUx3nLmP.elf
        Arguments:-
        File size:62304 bytes
        MD5 hash:3580505a73f0eb1548db93a2cb775b67