Linux Analysis Report s7vKdnDi77

Overview

General Information

Sample Name: s7vKdnDi77
Analysis ID: 553138
MD5: c7004f16f15c92e4acd0d78825329a56
SHA1: 08759270368ad69eab73219cc032a3dca620f1da
SHA256: 1ed43a0a7805aff1bae9db3a9cdd0a45ceb3fbd18f84ce7d8cf0c4d49d918838
Tags: 32armelfmirai
Infos:

Detection

Mirai
Score: 96
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Contains symbols with names commonly found in malware
Yara signature match
Sample contains strings indicative of password brute-forcing capabilities
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: s7vKdnDi77 Virustotal: Detection: 59% Perma Link
Source: s7vKdnDi77 Metadefender: Detection: 37% Perma Link
Source: s7vKdnDi77 ReversingLabs: Detection: 62%

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 115.53.244.14:23 -> 192.168.2.23:36440
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 115.53.244.14:23 -> 192.168.2.23:36440
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:46044
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:46044
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:46142
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:46142
Source: Traffic Snort IDS: 716 INFO TELNET access 123.142.76.198:23 -> 192.168.2.23:55886
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:46316
Source: Traffic Snort IDS: 716 INFO TELNET access 218.64.214.57:23 -> 192.168.2.23:42890
Source: Traffic Snort IDS: 716 INFO TELNET access 189.204.52.1:23 -> 192.168.2.23:50546
Source: Traffic Snort IDS: 716 INFO TELNET access 177.81.24.52:23 -> 192.168.2.23:37104
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:46316
Source: Traffic Snort IDS: 716 INFO TELNET access 189.204.52.1:23 -> 192.168.2.23:50614
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:46514
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 177.81.24.52:23 -> 192.168.2.23:37104
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 177.81.24.52:23 -> 192.168.2.23:37104
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 209.112.186.138:23 -> 192.168.2.23:46566
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 209.112.186.138:23 -> 192.168.2.23:46566
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:46514
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:46576
Source: Traffic Snort IDS: 716 INFO TELNET access 177.81.24.52:23 -> 192.168.2.23:37258
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:46576
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 177.81.24.52:23 -> 192.168.2.23:37258
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 177.81.24.52:23 -> 192.168.2.23:37258
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:46648
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 115.53.244.14:23 -> 192.168.2.23:37106
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 115.53.244.14:23 -> 192.168.2.23:37106
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:46648
Source: Traffic Snort IDS: 716 INFO TELNET access 177.81.24.52:23 -> 192.168.2.23:37406
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:46756
Source: Traffic Snort IDS: 716 INFO TELNET access 123.142.76.198:23 -> 192.168.2.23:56418
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:46756
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 177.81.24.52:23 -> 192.168.2.23:37406
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 177.81.24.52:23 -> 192.168.2.23:37406
Source: Traffic Snort IDS: 716 INFO TELNET access 218.64.214.57:23 -> 192.168.2.23:43350
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51320
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:46890
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51372
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:46890
Source: Traffic Snort IDS: 716 INFO TELNET access 177.81.24.52:23 -> 192.168.2.23:37618
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:47016
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51484
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 177.81.24.52:23 -> 192.168.2.23:37618
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 177.81.24.52:23 -> 192.168.2.23:37618
Source: Traffic Snort IDS: 2023447 ET TROJAN Possible Linux.Mirai Login Attempt (service) 192.168.2.23:47112 -> 209.112.186.138:23
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:47016
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51566
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 209.112.186.138:23 -> 192.168.2.23:47112
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 209.112.186.138:23 -> 192.168.2.23:47112
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51594
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:39608
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:47174
Source: Traffic Snort IDS: 716 INFO TELNET access 115.89.185.158:23 -> 192.168.2.23:34988
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51666
Source: Traffic Snort IDS: 716 INFO TELNET access 177.81.24.52:23 -> 192.168.2.23:37900
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:39696
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:47174
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 188.162.89.134:23 -> 192.168.2.23:33940
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 188.162.89.134:23 -> 192.168.2.23:33940
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51778
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:39814
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:47378
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 177.81.24.52:23 -> 192.168.2.23:37900
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 177.81.24.52:23 -> 192.168.2.23:37900
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:39910
Source: Traffic Snort IDS: 492 INFO TELNET login failed 221.199.8.158:23 -> 192.168.2.23:43664
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51910
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:47378
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51922
Source: Traffic Snort IDS: 716 INFO TELNET access 123.142.76.198:23 -> 192.168.2.23:57122
Source: Traffic Snort IDS: 716 INFO TELNET access 190.6.252.2:23 -> 192.168.2.23:51942
Source: Traffic Snort IDS: 716 INFO TELNET access 218.64.214.57:23 -> 192.168.2.23:44060
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:47526
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 188.162.89.134:23 -> 192.168.2.23:34226
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 188.162.89.134:23 -> 192.168.2.23:34226
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:39986
Source: Traffic Snort IDS: 716 INFO TELNET access 177.81.24.52:23 -> 192.168.2.23:38196
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:47526
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:40030
Source: Traffic Snort IDS: 492 INFO TELNET login failed 221.199.8.158:23 -> 192.168.2.23:43800
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 177.81.24.52:23 -> 192.168.2.23:38196
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 177.81.24.52:23 -> 192.168.2.23:38196
Source: Traffic Snort IDS: 716 INFO TELNET access 121.61.14.255:23 -> 192.168.2.23:59908
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:47608
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:40076
Source: Traffic Snort IDS: 716 INFO TELNET access 121.61.14.255:23 -> 192.168.2.23:59948
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:47608
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 188.162.89.134:23 -> 192.168.2.23:34378
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 188.162.89.134:23 -> 192.168.2.23:34378
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:40174
Source: Traffic Snort IDS: 716 INFO TELNET access 177.81.24.52:23 -> 192.168.2.23:38384
Source: Traffic Snort IDS: 492 INFO TELNET login failed 221.199.8.158:23 -> 192.168.2.23:43934
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:47738
Source: Traffic Snort IDS: 716 INFO TELNET access 121.61.14.255:23 -> 192.168.2.23:60044
Source: Traffic Snort IDS: 716 INFO TELNET access 121.61.14.255:23 -> 192.168.2.23:60064
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36852
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36894
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36912
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 177.81.24.52:23 -> 192.168.2.23:38384
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 177.81.24.52:23 -> 192.168.2.23:38384
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:47738
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:40282
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36920
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36924
Source: Traffic Snort IDS: 716 INFO TELNET access 115.89.185.158:23 -> 192.168.2.23:35626
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36942
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36950
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36954
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36978
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36982
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36986
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 209.112.186.138:23 -> 192.168.2.23:47896
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 209.112.186.138:23 -> 192.168.2.23:47896
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:36984
Source: Traffic Snort IDS: 716 INFO TELNET access 121.61.14.255:23 -> 192.168.2.23:60214
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37006
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37010
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37014
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37020
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:47942
Source: Traffic Snort IDS: 492 INFO TELNET login failed 221.199.8.158:23 -> 192.168.2.23:44138
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37042
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37048
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37050
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:40426
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37058
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 188.162.89.134:23 -> 192.168.2.23:34630
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 188.162.89.134:23 -> 192.168.2.23:34630
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37086
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37092
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37098
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37106
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37134
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37146
Source: Traffic Snort IDS: 716 INFO TELNET access 121.61.14.255:23 -> 192.168.2.23:60372
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37160
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37168
Source: Traffic Snort IDS: 716 INFO TELNET access 112.115.163.194:23 -> 192.168.2.23:34782
Source: Traffic Snort IDS: 492 INFO TELNET login failed 116.55.54.117:23 -> 192.168.2.23:47942
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 221.155.33.194:23 -> 192.168.2.23:57538
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 221.155.33.194:23 -> 192.168.2.23:57538
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37194
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37200
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37210
Source: Traffic Snort IDS: 716 INFO TELNET access 121.61.14.255:23 -> 192.168.2.23:60434
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37216
Source: Traffic Snort IDS: 716 INFO TELNET access 177.81.24.52:23 -> 192.168.2.23:38810
Source: Traffic Snort IDS: 716 INFO TELNET access 218.28.175.187:23 -> 192.168.2.23:40618
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37250
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37260
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37266
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37270
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37290
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37296
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37298
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37304
Source: Traffic Snort IDS: 716 INFO TELNET access 116.55.54.117:23 -> 192.168.2.23:48230
Source: Traffic Snort IDS: 716 INFO TELNET access 121.61.14.255:23 -> 192.168.2.23:60516
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37322
Source: Traffic Snort IDS: 716 INFO TELNET access 65.155.84.89:23 -> 192.168.2.23:37328
Source: Traffic Snort IDS: 492 INFO TELNET login failed 112.115.163.194:23 -> 192.168.2.23:34782
Uses known network protocols on non-standard ports
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35390
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35398
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35404
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35414
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35422
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35430
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35442
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35446
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35450
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35454
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35466
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35454
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35476
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35480
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35492
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35498
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35500
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35512
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35514
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35520
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35554
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35556
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35562
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35566
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35576
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35582
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57426
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57434
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57442
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57466
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57476
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57490
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57502
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57520
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57530
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57550
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57566
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57580
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57600
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57618
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57652
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57668
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57690
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57728
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57742
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57760
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57798
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57816
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.23:39428 -> 109.237.96.10:16771
Sample listens on a socket
Source: /tmp/s7vKdnDi77 (PID: 5240) Socket: 127.0.0.1::9473 Jump to behavior
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 109.237.96.10
Source: unknown TCP traffic detected without corresponding DNS query: 179.152.52.55
Source: unknown TCP traffic detected without corresponding DNS query: 83.2.90.160
Source: unknown TCP traffic detected without corresponding DNS query: 152.152.127.54
Source: unknown TCP traffic detected without corresponding DNS query: 220.115.20.26
Source: unknown TCP traffic detected without corresponding DNS query: 128.99.42.49
Source: unknown TCP traffic detected without corresponding DNS query: 165.47.168.40
Source: unknown TCP traffic detected without corresponding DNS query: 222.77.217.211
Source: unknown TCP traffic detected without corresponding DNS query: 153.84.214.109
Source: unknown TCP traffic detected without corresponding DNS query: 108.191.9.10
Source: unknown TCP traffic detected without corresponding DNS query: 183.161.149.26
Source: unknown TCP traffic detected without corresponding DNS query: 126.85.218.158
Source: unknown TCP traffic detected without corresponding DNS query: 148.168.95.159
Source: unknown TCP traffic detected without corresponding DNS query: 180.42.181.127
Source: unknown TCP traffic detected without corresponding DNS query: 40.63.80.3
Source: unknown TCP traffic detected without corresponding DNS query: 95.53.136.208
Source: unknown TCP traffic detected without corresponding DNS query: 35.197.189.106
Source: unknown TCP traffic detected without corresponding DNS query: 146.253.81.113
Source: unknown TCP traffic detected without corresponding DNS query: 199.52.99.108
Source: unknown TCP traffic detected without corresponding DNS query: 92.185.158.253
Source: unknown TCP traffic detected without corresponding DNS query: 102.242.177.197
Source: unknown TCP traffic detected without corresponding DNS query: 207.235.142.149
Source: unknown TCP traffic detected without corresponding DNS query: 17.76.13.215
Source: unknown TCP traffic detected without corresponding DNS query: 187.169.23.117
Source: unknown TCP traffic detected without corresponding DNS query: 211.155.176.161
Source: unknown TCP traffic detected without corresponding DNS query: 164.96.72.64
Source: unknown TCP traffic detected without corresponding DNS query: 211.181.176.110
Source: unknown TCP traffic detected without corresponding DNS query: 118.205.227.152
Source: unknown TCP traffic detected without corresponding DNS query: 206.211.49.208
Source: unknown TCP traffic detected without corresponding DNS query: 157.22.237.202
Source: unknown TCP traffic detected without corresponding DNS query: 113.227.19.160
Source: unknown TCP traffic detected without corresponding DNS query: 152.88.182.158
Source: unknown TCP traffic detected without corresponding DNS query: 139.151.39.235
Source: unknown TCP traffic detected without corresponding DNS query: 1.204.61.234
Source: unknown TCP traffic detected without corresponding DNS query: 223.70.146.149
Source: unknown TCP traffic detected without corresponding DNS query: 73.66.22.178
Source: unknown TCP traffic detected without corresponding DNS query: 24.184.140.0
Source: unknown TCP traffic detected without corresponding DNS query: 104.7.129.78
Source: unknown TCP traffic detected without corresponding DNS query: 194.216.87.166
Source: unknown TCP traffic detected without corresponding DNS query: 63.185.220.145
Source: unknown TCP traffic detected without corresponding DNS query: 216.225.5.196
Source: unknown TCP traffic detected without corresponding DNS query: 187.71.94.135
Source: unknown TCP traffic detected without corresponding DNS query: 222.38.0.160
Source: unknown TCP traffic detected without corresponding DNS query: 101.19.252.3
Source: unknown TCP traffic detected without corresponding DNS query: 148.229.20.43
Source: unknown TCP traffic detected without corresponding DNS query: 179.84.203.140
Source: unknown TCP traffic detected without corresponding DNS query: 87.1.115.98
Source: unknown TCP traffic detected without corresponding DNS query: 75.218.47.46
Source: unknown TCP traffic detected without corresponding DNS query: 137.138.184.242
Source: unknown TCP traffic detected without corresponding DNS query: 152.18.190.84

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: s7vKdnDi77, type: SAMPLE Matched rule: Detects ELF malware Mirai related Author: Florian Roth
Source: 5240.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY Matched rule: Detects ELF malware Mirai related Author: Florian Roth
Source: 5246.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY Matched rule: Detects ELF malware Mirai related Author: Florian Roth
Contains symbols with names commonly found in malware
Source: ELF static info symbol of initial sample Name: attack.c
Source: ELF static info symbol of initial sample Name: attack_app.c
Source: ELF static info symbol of initial sample Name: attack_app_http
Source: ELF static info symbol of initial sample Name: attack_get_opt_int
Source: ELF static info symbol of initial sample Name: attack_get_opt_ip
Source: ELF static info symbol of initial sample Name: attack_get_opt_str
Source: ELF static info symbol of initial sample Name: attack_init
Source: ELF static info symbol of initial sample Name: attack_method.c
Source: ELF static info symbol of initial sample Name: attack_method_ack
Source: ELF static info symbol of initial sample Name: attack_method_gre
Yara signature match
Source: s7vKdnDi77, type: SAMPLE Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: s7vKdnDi77, type: SAMPLE Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
Source: 5240.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5240.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
Source: 5240.1.0000000063017c71.000000008031ab92.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5246.1.0000000063017c71.000000008031ab92.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5246.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 5246.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
Source: Process Memory Space: s7vKdnDi77 PID: 5240, type: MEMORYSTR Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: Process Memory Space: s7vKdnDi77 PID: 5246, type: MEMORYSTR Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Sample contains strings indicative of password brute-forcing capabilities
Source: Initial sample String containing potential weak password found: default
Source: Initial sample String containing potential weak password found: admin
Source: Initial sample String containing potential weak password found: 54321
Source: Initial sample String containing potential weak password found: guest
Source: Initial sample String containing potential weak password found: 12345
Source: Initial sample String containing potential weak password found: supervisor
Source: Initial sample String containing potential weak password found: password
Source: Initial sample String containing potential weak password found: admin1234
Source: Initial sample String containing potential weak password found: 123456
Source: Initial sample String containing potential weak password found: service
Source: Initial sample String containing potential weak password found: support
Source: Initial sample String containing potential weak password found: 12345678
Source: classification engine Classification label: mal96.troj.lin@0/0@0/0

Hooking and other Techniques for Hiding and Protection:

barindex
Uses known network protocols on non-standard ports
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35390
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35398
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35404
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35414
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35422
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35430
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35442
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35446
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35450
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35454
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35466
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35454
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35476
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35480
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35492
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35498
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35500
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35512
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35514
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35520
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35554
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35556
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35562
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35566
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35576
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35582
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57426
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57434
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57442
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57466
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57476
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57490
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57502
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57520
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57530
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57550
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57566
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57580
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57600
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57618
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57652
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57668
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57690
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57728
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57742
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57760
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57798
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57816

Malware Analysis System Evasion:

barindex
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/s7vKdnDi77 (PID: 5240) Queries kernel information via 'uname': Jump to behavior
Source: s7vKdnDi77, 5240.1.00000000b6b1ac15.00000000185438df.rw-.sdmp, s7vKdnDi77, 5246.1.00000000b6b1ac15.00000000cef7dc57.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: s7vKdnDi77, 5240.1.00000000b6b1ac15.00000000185438df.rw-.sdmp, s7vKdnDi77, 5246.1.00000000b6b1ac15.00000000cef7dc57.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: s7vKdnDi77, 5240.1.00000000c2533b13.00000000a1dd4886.rw-.sdmp, s7vKdnDi77, 5246.1.00000000c2533b13.00000000a1dd4886.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: s7vKdnDi77, 5240.1.00000000c2533b13.00000000a1dd4886.rw-.sdmp, s7vKdnDi77, 5246.1.00000000c2533b13.00000000a1dd4886.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/s7vKdnDi77SUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/s7vKdnDi77

Stealing of Sensitive Information:

barindex
Yara detected Mirai
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: s7vKdnDi77, type: SAMPLE
Source: Yara match File source: 5240.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5246.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected Mirai
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: s7vKdnDi77, type: SAMPLE
Source: Yara match File source: 5240.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5246.1.0000000050b0cb91.00000000265421ed.r-x.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs