Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
PP6je8BlFL.elf

Overview

General Information

Sample name:PP6je8BlFL.elf
renamed because original name is a hash value
Original sample name:1f0c496a8ae7dac31741f3b3d34c2c46.elf
Analysis ID:1438524
MD5:1f0c496a8ae7dac31741f3b3d34c2c46
SHA1:0f4e5ac19e8a22aa3e966b36550047bd7d532c98
SHA256:148ba36ea40a59c165f657cb89f1f7b29f150267400b9dc8c38e8a2a9c38b5fa
Tags:32elfintelmirai
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1438524
Start date and time:2024-05-08 20:17:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 15s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:PP6je8BlFL.elf
renamed because original name is a hash value
Original Sample Name:1f0c496a8ae7dac31741f3b3d34c2c46.elf
Detection:MAL
Classification:mal64.troj.linELF@0/0@1/0
  • VT rate limit hit for: PP6je8BlFL.elf
Command:/tmp/PP6je8BlFL.elf
PID:5522
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
xXxSlicexXxxVEGA.
Standard Error:
  • system is lnxubuntu20
  • cleanup
SourceRuleDescriptionAuthorStrings
PP6je8BlFL.elfLinux_Trojan_Mirai_fa3ad9d0unknownunknown
  • 0x46a:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
PP6je8BlFL.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x62d0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
PP6je8BlFL.elfLinux_Trojan_Mirai_93fc3657unknownunknown
  • 0x4f1:$a: 00 00 00 89 44 24 60 89 D1 31 C0 8B 7C 24 28 FC F3 AB 89 D1 8B 7C
PP6je8BlFL.elfLinux_Trojan_Mirai_804f8e7cunknownunknown
  • 0x39b:$a: 31 ED 81 E1 FF 00 00 00 89 4C 24 58 89 EA C6 46 04 00 C1 FA 1F
PP6je8BlFL.elfLinux_Trojan_Mirai_99d78950unknownunknown
  • 0x1140:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x1220:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x12f5:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x15a0:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x1a33:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
Click to see the 6 entries
SourceRuleDescriptionAuthorStrings
5523.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_fa3ad9d0unknownunknown
  • 0x46a:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
5523.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x62d0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
5523.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_93fc3657unknownunknown
  • 0x4f1:$a: 00 00 00 89 44 24 60 89 D1 31 C0 8B 7C 24 28 FC F3 AB 89 D1 8B 7C
5523.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_804f8e7cunknownunknown
  • 0x39b:$a: 31 ED 81 E1 FF 00 00 00 89 4C 24 58 89 EA C6 46 04 00 C1 FA 1F
5523.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_99d78950unknownunknown
  • 0x1140:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x1220:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x12f5:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x15a0:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x1a33:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
Click to see the 28 entries
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PP6je8BlFL.elfReversingLabs: Detection: 60%
Source: PP6je8BlFL.elfJoe Sandbox ML: detected

Networking

barindex
Source: global trafficTCP traffic: 91.92.244.58 ports 0,1,5,6,9,60195
Source: global trafficTCP traffic: 192.168.2.15:38226 -> 91.92.244.58:60195
Source: global trafficDNS traffic detected: DNS query: minuoddos.top

System Summary

barindex
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: PP6je8BlFL.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5523.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5522.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5525.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal64.troj.linELF@0/0@1/0
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1185/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3241/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1732/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1730/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1333/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1695/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3235/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3234/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/911/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/515/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/914/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1617/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1615/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/917/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3255/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3253/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1591/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3252/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3251/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3250/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1623/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1588/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3249/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/764/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1585/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3246/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/766/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/800/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/888/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/802/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1509/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/803/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/804/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1867/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1484/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/490/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1514/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1634/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1479/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1875/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/654/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/655/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/656/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/777/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/931/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1595/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/657/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/812/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/779/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/658/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/933/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/418/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/419/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3275/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3274/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3273/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3272/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/782/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3303/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1762/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3027/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1486/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/789/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1806/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1660/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3044/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/793/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/794/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/674/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/796/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/675/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/676/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1498/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1497/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1496/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3157/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3278/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1659/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3210/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3298/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3052/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/680/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/681/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3292/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1701/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1666/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3205/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3047/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3201/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/723/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/724/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1704/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1669/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3060/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1440/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3222/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3188/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3220/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3064/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3062/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/3183/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1679/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/850/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1432/mapsJump to behavior
Source: /tmp/PP6je8BlFL.elf (PID: 5526)File opened: /proc/1553/mapsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1438524 Sample: PP6je8BlFL.elf Startdate: 08/05/2024 Architecture: LINUX Score: 64 18 minuoddos.top 91.92.244.58, 38226, 60195 THEZONEBG Bulgaria 2->18 20 Malicious sample detected (through community Yara rule) 2->20 22 Multi AV Scanner detection for submitted file 2->22 24 Machine Learning detection for sample 2->24 26 Connects to many ports of the same IP (likely port scanning) 2->26 8 PP6je8BlFL.elf 2->8         started        signatures3 process4 process5 10 PP6je8BlFL.elf 8->10         started        12 PP6je8BlFL.elf 8->12         started        process6 14 PP6je8BlFL.elf 10->14         started        16 PP6je8BlFL.elf 10->16         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PP6je8BlFL.elf61%ReversingLabsLinux.Trojan.Mirai
PP6je8BlFL.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
minuoddos.top
91.92.244.58
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    91.92.244.58
    minuoddos.topBulgaria
    34368THEZONEBGtrue
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    91.92.244.58Lj7qNwy54U.elfGet hashmaliciousUnknownBrowse
      g4jUx3nLmP.elfGet hashmaliciousUnknownBrowse
        JupQoUiGIu.elfGet hashmaliciousUnknownBrowse
          mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            minuoddos.topLj7qNwy54U.elfGet hashmaliciousUnknownBrowse
            • 91.92.244.58
            g4jUx3nLmP.elfGet hashmaliciousUnknownBrowse
            • 91.92.244.58
            JupQoUiGIu.elfGet hashmaliciousUnknownBrowse
            • 91.92.244.58
            mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
            • 91.92.244.58
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            THEZONEBGLj7qNwy54U.elfGet hashmaliciousUnknownBrowse
            • 91.92.244.58
            g4jUx3nLmP.elfGet hashmaliciousUnknownBrowse
            • 91.92.244.58
            JupQoUiGIu.elfGet hashmaliciousUnknownBrowse
            • 91.92.244.58
            mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
            • 91.92.244.58
            z51ComprobantedePago.exeGet hashmaliciousXenoRATBrowse
            • 91.92.243.131
            Comprobante.exeGet hashmaliciousXenoRATBrowse
            • 91.92.243.131
            SecuriteInfo.com.Trojan.PackedNET.2147.22278.5618.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
            • 91.92.253.28
            VT3czLymhe.exeGet hashmaliciousUnknownBrowse
            • 91.92.253.114
            Comprobante.exeGet hashmaliciousXenoRATBrowse
            • 91.92.243.131
            download.elfGet hashmaliciousUnknownBrowse
            • 91.92.245.104
            No context
            No context
            No created / dropped files found
            File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
            Entropy (8bit):6.3076093089089955
            TrID:
            • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
            • ELF Executable and Linkable format (generic) (4004/1) 49.84%
            File name:PP6je8BlFL.elf
            File size:58'128 bytes
            MD5:1f0c496a8ae7dac31741f3b3d34c2c46
            SHA1:0f4e5ac19e8a22aa3e966b36550047bd7d532c98
            SHA256:148ba36ea40a59c165f657cb89f1f7b29f150267400b9dc8c38e8a2a9c38b5fa
            SHA512:0cf08c0bd41f510432a1a39a9fd8b0611309e2637f5ec924ae56d32f8112725de05c5db1ce9d93bbe4fb1968c05a8bfc5736d684de15609560054b01dba3f9d3
            SSDEEP:1536:CVKFOD7prJkaNup1COy7O/HgedDRVON4i7EnhP8xC:XFOXprOfPTy7yHgedDRVG43VQ
            TLSH:554329C8E6D7E9F4EC090A313137EF32D6B6E13F252CD993D7986567AD41602D4022AD
            File Content Preview:.ELF....................d...4...........4. ...(.....................`...`....................`...`..@...............Q.td............................U..S.......w....h....s...[]...$.............U......=@a...t..5....$`.....$`......u........t....h`[..........

            ELF header

            Class:ELF32
            Data:2's complement, little endian
            Version:1 (current)
            Machine:Intel 80386
            Version Number:0x1
            Type:EXEC (Executable file)
            OS/ABI:UNIX - System V
            ABI Version:0
            Entry Point Address:0x8048164
            Flags:0x0
            ELF Header Size:52
            Program Header Offset:52
            Program Header Size:32
            Number of Program Headers:3
            Section Header Offset:57728
            Section Header Size:40
            Number of Section Headers:10
            Header String Table Index:9
            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
            NULL0x00x00x00x00x0000
            .initPROGBITS0x80480940x940x1c0x00x6AX001
            .textPROGBITS0x80480b00xb00xce960x00x6AX0016
            .finiPROGBITS0x8054f460xcf460x170x00x6AX001
            .rodataPROGBITS0x8054f600xcf600xc000x00x2A0032
            .ctorsPROGBITS0x80560000xe0000x80x00x3WA004
            .dtorsPROGBITS0x80560080xe0080x80x00x3WA004
            .dataPROGBITS0x80560200xe0200x1200x00x3WA0032
            .bssNOBITS0x80561400xe1400x7a00x00x3WA0032
            .shstrtabSTRTAB0x00xe1400x3e0x00x0001
            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
            LOAD0x00x80480000x80480000xdb600xdb606.40370x5R E0x1000.init .text .fini .rodata
            LOAD0xe0000x80560000x80560000x1400x8e04.56300x6RW 0x1000.ctors .dtors .data .bss
            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
            TimestampSource PortDest PortSource IPDest IP
            May 8, 2024 20:17:46.056384087 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:17:46.358511925 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:17:46.358684063 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:17:46.358735085 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:17:46.662328959 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:17:46.662560940 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:17:46.964762926 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:17:56.368647099 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:17:56.670778990 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:17:56.670794964 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:17:56.671005964 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:18:12.003973961 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:18:12.004223108 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:18:27.306859970 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:18:27.306979895 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:18:42.609870911 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:18:42.609956980 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:18:56.727485895 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:18:57.029699087 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:18:57.029793978 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:19:12.387875080 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:19:12.387996912 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:19:27.690893888 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:19:27.691035986 CEST3822660195192.168.2.1591.92.244.58
            May 8, 2024 20:19:42.993871927 CEST601953822691.92.244.58192.168.2.15
            May 8, 2024 20:19:42.993998051 CEST3822660195192.168.2.1591.92.244.58
            TimestampSource PortDest PortSource IPDest IP
            May 8, 2024 20:17:45.475858927 CEST5094153192.168.2.158.8.8.8
            May 8, 2024 20:17:46.056207895 CEST53509418.8.8.8192.168.2.15
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            May 8, 2024 20:17:45.475858927 CEST192.168.2.158.8.8.80xe95dStandard query (0)minuoddos.topA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            May 8, 2024 20:17:46.056207895 CEST8.8.8.8192.168.2.150xe95dNo error (0)minuoddos.top91.92.244.58A (IP address)IN (0x0001)false

            System Behavior

            Start time (UTC):18:17:44
            Start date (UTC):08/05/2024
            Path:/tmp/PP6je8BlFL.elf
            Arguments:/tmp/PP6je8BlFL.elf
            File size:58128 bytes
            MD5 hash:1f0c496a8ae7dac31741f3b3d34c2c46

            Start time (UTC):18:17:44
            Start date (UTC):08/05/2024
            Path:/tmp/PP6je8BlFL.elf
            Arguments:-
            File size:58128 bytes
            MD5 hash:1f0c496a8ae7dac31741f3b3d34c2c46

            Start time (UTC):18:17:44
            Start date (UTC):08/05/2024
            Path:/tmp/PP6je8BlFL.elf
            Arguments:-
            File size:58128 bytes
            MD5 hash:1f0c496a8ae7dac31741f3b3d34c2c46

            Start time (UTC):18:17:44
            Start date (UTC):08/05/2024
            Path:/tmp/PP6je8BlFL.elf
            Arguments:-
            File size:58128 bytes
            MD5 hash:1f0c496a8ae7dac31741f3b3d34c2c46

            Start time (UTC):18:17:44
            Start date (UTC):08/05/2024
            Path:/tmp/PP6je8BlFL.elf
            Arguments:-
            File size:58128 bytes
            MD5 hash:1f0c496a8ae7dac31741f3b3d34c2c46