Linux Analysis Report SedZv73LJb

Overview

General Information

Sample Name: SedZv73LJb
Analysis ID: 537271
MD5: bdc02fe5c4e820cc750d4b5b7280f2cd
SHA1: d49ff96bbfbd990ffdb4727a809b97eb05bf1c2a
SHA256: a06645dcacd00b2ffa5db96729241c355e012fa87a2ef16d595a4bac7a7dcd10
Tags: 32elfmipsmirai
Infos:

Detection

Mirai
Score: 84
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Sample is packed with UPX
Sample contains only a LOAD segment without any section mappings
Yara signature match
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample listens on a socket
Sample tries to kill a process (SIGKILL)

Classification

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:53452 -> 85.98.33.21:23
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 109.75.41.53:23 -> 192.168.2.23:57658
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 109.75.41.53:23 -> 192.168.2.23:57658
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 109.75.41.53:23 -> 192.168.2.23:57706
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 109.75.41.53:23 -> 192.168.2.23:57706
Source: Traffic Snort IDS: 716 INFO TELNET access 218.158.20.113:23 -> 192.168.2.23:55176
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 109.75.41.53:23 -> 192.168.2.23:57714
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 109.75.41.53:23 -> 192.168.2.23:57714
Source: Traffic Snort IDS: 716 INFO TELNET access 218.158.20.113:23 -> 192.168.2.23:55184
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 109.75.41.53:23 -> 192.168.2.23:57738
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 109.75.41.53:23 -> 192.168.2.23:57738
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.23:60182 -> 194.85.248.177:9506
Sample listens on a socket
Source: /tmp/SedZv73LJb (PID: 5218) Socket: 0.0.0.0::23 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5218) Socket: 0.0.0.0::0 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5218) Socket: 0.0.0.0::80 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5218) Socket: 0.0.0.0::81 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5218) Socket: 0.0.0.0::8443 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5218) Socket: 0.0.0.0::9009 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) Socket: 0.0.0.0::0 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) Socket: 0.0.0.0::80 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) Socket: 0.0.0.0::81 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) Socket: 0.0.0.0::8443 Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) Socket: 0.0.0.0::9009 Jump to behavior
Source: /usr/sbin/sshd (PID: 5250) Socket: 0.0.0.0::22 Jump to behavior
Source: /usr/sbin/sshd (PID: 5250) Socket: [::]::22 Jump to behavior
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 33608
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 33608 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 194.85.248.177
Source: unknown TCP traffic detected without corresponding DNS query: 68.20.73.222
Source: unknown TCP traffic detected without corresponding DNS query: 53.7.185.222
Source: unknown TCP traffic detected without corresponding DNS query: 193.19.134.102
Source: unknown TCP traffic detected without corresponding DNS query: 206.181.171.220
Source: unknown TCP traffic detected without corresponding DNS query: 208.127.165.164
Source: unknown TCP traffic detected without corresponding DNS query: 19.133.34.3
Source: unknown TCP traffic detected without corresponding DNS query: 251.47.7.130
Source: unknown TCP traffic detected without corresponding DNS query: 197.147.206.60
Source: unknown TCP traffic detected without corresponding DNS query: 155.23.166.37
Source: unknown TCP traffic detected without corresponding DNS query: 204.206.114.168
Source: unknown TCP traffic detected without corresponding DNS query: 141.155.189.87
Source: unknown TCP traffic detected without corresponding DNS query: 76.120.190.112
Source: unknown TCP traffic detected without corresponding DNS query: 73.77.62.155
Source: unknown TCP traffic detected without corresponding DNS query: 111.151.184.31
Source: unknown TCP traffic detected without corresponding DNS query: 146.209.214.200
Source: unknown TCP traffic detected without corresponding DNS query: 148.202.143.153
Source: unknown TCP traffic detected without corresponding DNS query: 168.155.156.21
Source: unknown TCP traffic detected without corresponding DNS query: 14.222.35.206
Source: unknown TCP traffic detected without corresponding DNS query: 115.108.236.144
Source: unknown TCP traffic detected without corresponding DNS query: 162.155.229.204
Source: unknown TCP traffic detected without corresponding DNS query: 19.70.204.185
Source: unknown TCP traffic detected without corresponding DNS query: 157.38.15.98
Source: unknown TCP traffic detected without corresponding DNS query: 109.86.34.71
Source: unknown TCP traffic detected without corresponding DNS query: 217.180.72.165
Source: unknown TCP traffic detected without corresponding DNS query: 177.27.67.169
Source: unknown TCP traffic detected without corresponding DNS query: 166.28.49.108
Source: unknown TCP traffic detected without corresponding DNS query: 174.37.25.112
Source: unknown TCP traffic detected without corresponding DNS query: 155.112.238.0
Source: unknown TCP traffic detected without corresponding DNS query: 38.198.113.148
Source: unknown TCP traffic detected without corresponding DNS query: 86.184.2.247
Source: unknown TCP traffic detected without corresponding DNS query: 82.74.127.37
Source: unknown TCP traffic detected without corresponding DNS query: 106.95.82.87
Source: unknown TCP traffic detected without corresponding DNS query: 82.159.78.152
Source: unknown TCP traffic detected without corresponding DNS query: 48.25.188.163
Source: unknown TCP traffic detected without corresponding DNS query: 194.78.224.129
Source: unknown TCP traffic detected without corresponding DNS query: 145.11.7.98
Source: unknown TCP traffic detected without corresponding DNS query: 36.164.103.147
Source: unknown TCP traffic detected without corresponding DNS query: 18.160.42.126
Source: unknown TCP traffic detected without corresponding DNS query: 75.134.118.42
Source: unknown TCP traffic detected without corresponding DNS query: 80.68.229.38
Source: unknown TCP traffic detected without corresponding DNS query: 207.85.65.225
Source: unknown TCP traffic detected without corresponding DNS query: 184.84.252.243
Source: unknown TCP traffic detected without corresponding DNS query: 70.224.215.167
Source: unknown TCP traffic detected without corresponding DNS query: 48.22.47.40
Source: unknown TCP traffic detected without corresponding DNS query: 75.91.72.202
Source: unknown TCP traffic detected without corresponding DNS query: 95.197.174.237
Source: unknown TCP traffic detected without corresponding DNS query: 12.60.239.205
Source: unknown TCP traffic detected without corresponding DNS query: 119.160.44.82
Source: unknown TCP traffic detected without corresponding DNS query: 146.254.139.189
Source: SedZv73LJb String found in binary or memory: http://upx.sf.net

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 5220.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Detects Mirai Botnet Malware Author: Florian Roth
Source: 5220.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Detects ELF malware Mirai related Author: Florian Roth
Source: 5226.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Detects Mirai Botnet Malware Author: Florian Roth
Source: 5226.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Detects ELF malware Mirai related Author: Florian Roth
Source: 5216.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Detects Mirai Botnet Malware Author: Florian Roth
Source: 5216.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Detects ELF malware Mirai related Author: Florian Roth
Source: 5218.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Detects Mirai Botnet Malware Author: Florian Roth
Source: 5218.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Detects ELF malware Mirai related Author: Florian Roth
Sample contains only a LOAD segment without any section mappings
Source: LOAD without section mappings Program segment: 0x100000
Yara signature match
Source: SedZv73LJb, type: SAMPLE Matched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
Source: 5218.1.0000000047c7bfd3.0000000051fda745.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5226.1.0000000047c7bfd3.0000000051fda745.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5216.1.0000000047c7bfd3.0000000051fda745.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5220.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5220.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
Source: 5220.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
Source: 5226.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5226.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
Source: 5226.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
Source: 5216.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5216.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
Source: 5216.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
Source: 5220.1.0000000047c7bfd3.0000000051fda745.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5218.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5218.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
Source: 5218.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
Sample tries to kill a process (SIGKILL)
Source: /tmp/SedZv73LJb (PID: 5218) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) SIGKILL sent: pid: 5218, result: successful Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) SIGKILL sent: pid: 759, result: successful Jump to behavior
Source: classification engine Classification label: mal84.troj.evad.lin@0/2@0/0

Data Obfuscation:

barindex
Sample is packed with UPX
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $

Persistence and Installation Behavior:

barindex
Enumerates processes within the "proc" file system
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/4450/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/4450/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/4331/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/4331/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2033/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2033/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2033/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1582/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1582/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1582/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2275/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2275/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1612/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1612/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1612/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1579/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1579/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1579/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1699/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1699/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1699/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1335/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1335/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1335/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1698/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1698/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1698/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2028/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2028/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2028/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1334/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1334/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1334/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1576/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1576/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1576/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2302/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2302/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/3236/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/3236/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2025/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2025/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2025/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2146/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2146/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/910/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/912/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/912/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/912/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/759/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/759/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/759/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/517/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2307/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2307/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/918/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/918/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/918/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/5030/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/5030/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1594/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1594/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1594/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2285/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2285/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2281/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2281/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1349/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1349/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1349/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1623/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1623/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1623/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/761/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/761/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/761/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1622/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1622/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1622/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/884/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/884/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/884/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1983/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1983/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1983/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2038/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2038/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/2038/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1586/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1586/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1586/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1465/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1465/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1465/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1344/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1344/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1344/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1860/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1860/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1860/exe Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1463/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1463/fd Jump to behavior
Source: /tmp/SedZv73LJb (PID: 5224) File opened: /proc/1463/exe Jump to behavior
Executes the "rm" command used to delete files or directories
Source: /usr/bin/dash (PID: 5258) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.FfRdbVixpI /tmp/tmp.30Eql1npMD /tmp/tmp.8ub6rio7wF Jump to behavior

Malware Analysis System Evasion:

barindex
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/SedZv73LJb (PID: 5216) Queries kernel information via 'uname': Jump to behavior
Source: SedZv73LJb, 5216.1.00000000bdff67fb.000000002920bcd6.rw-.sdmp, SedZv73LJb, 5218.1.00000000bdff67fb.000000002920bcd6.rw-.sdmp, SedZv73LJb, 5220.1.00000000bdff67fb.000000002920bcd6.rw-.sdmp, SedZv73LJb, 5226.1.00000000bdff67fb.000000002920bcd6.rw-.sdmp Binary or memory string: Mx86_64/usr/bin/qemu-mipsel/tmp/SedZv73LJbSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/SedZv73LJb
Source: SedZv73LJb, 5216.1.00000000da7b14a4.00000000e5bbc230.rw-.sdmp, SedZv73LJb, 5218.1.00000000da7b14a4.00000000e5bbc230.rw-.sdmp, SedZv73LJb, 5220.1.00000000da7b14a4.00000000e5bbc230.rw-.sdmp, SedZv73LJb, 5226.1.00000000da7b14a4.00000000e5bbc230.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mipsel
Source: SedZv73LJb, 5216.1.00000000da7b14a4.00000000e5bbc230.rw-.sdmp, SedZv73LJb, 5218.1.00000000da7b14a4.00000000e5bbc230.rw-.sdmp, SedZv73LJb, 5220.1.00000000da7b14a4.00000000e5bbc230.rw-.sdmp, SedZv73LJb, 5226.1.00000000da7b14a4.00000000e5bbc230.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/mipsel
Source: SedZv73LJb, 5216.1.00000000bdff67fb.000000002920bcd6.rw-.sdmp, SedZv73LJb, 5218.1.00000000bdff67fb.000000002920bcd6.rw-.sdmp, SedZv73LJb, 5220.1.00000000bdff67fb.000000002920bcd6.rw-.sdmp, SedZv73LJb, 5226.1.00000000bdff67fb.000000002920bcd6.rw-.sdmp Binary or memory string: /usr/bin/qemu-mipsel

Stealing of Sensitive Information:

barindex
Yara detected Mirai
Source: Yara match File source: 5220.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5226.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5216.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5218.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY
Source: Yara match File source: dump.pcap, type: PCAP

Remote Access Functionality:

barindex
Yara detected Mirai
Source: Yara match File source: 5220.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5226.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5216.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5218.1.0000000001011e93.00000000a387de8a.r-x.sdmp, type: MEMORY
Source: Yara match File source: dump.pcap, type: PCAP
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs