Linux Analysis Report
2DbzKHhgOH

Overview

General Information

Sample Name: 2DbzKHhgOH
Analysis ID: 680657
MD5: 91e1ba2317dac69005bd8f5494297730
SHA1: 314ac7afbe482e1a412632950bc03f5d00bd6e0a
SHA256: 7610f435e009a531631ad480f342b21b87e56c05ac55d66ad99a1a3e5523fad2
Tags: 32elfmiraisparc
Infos:

Detection

Mirai
Score: 76
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Mirai
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Yara signature match
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)

Classification

AV Detection

barindex
Source: 2DbzKHhgOH Virustotal: Detection: 56% Perma Link
Source: 2DbzKHhgOH ReversingLabs: Detection: 53%

Networking

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 54828
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 39698
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 39834
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55020
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 39992
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55224
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40170
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55448
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40338
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55666
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40516
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40672
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55858
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40822
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 56052
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40984
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 56248
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41152
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 56440
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 56628
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57026
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57174
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57320
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57462
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57602
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57758
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57912
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 58058
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 58194
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 58346
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:35686 -> 208.67.106.33:1312
Source: /tmp/2DbzKHhgOH (PID: 6226) Socket: 0.0.0.0::0 Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) Socket: 0.0.0.0::23 Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) Socket: 0.0.0.0::53413 Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) Socket: 0.0.0.0::80 Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) Socket: 0.0.0.0::52869 Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) Socket: 0.0.0.0::37215 Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) Socket: 0.0.0.0::0 Jump to behavior
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 208.67.106.33
Source: unknown TCP traffic detected without corresponding DNS query: 103.192.46.127
Source: unknown TCP traffic detected without corresponding DNS query: 34.201.192.127
Source: unknown TCP traffic detected without corresponding DNS query: 37.34.203.231
Source: unknown TCP traffic detected without corresponding DNS query: 59.155.217.82
Source: unknown TCP traffic detected without corresponding DNS query: 79.0.81.169
Source: unknown TCP traffic detected without corresponding DNS query: 187.127.228.76
Source: unknown TCP traffic detected without corresponding DNS query: 47.195.84.144
Source: unknown TCP traffic detected without corresponding DNS query: 59.4.192.49
Source: unknown TCP traffic detected without corresponding DNS query: 20.96.18.204
Source: unknown TCP traffic detected without corresponding DNS query: 84.144.162.32
Source: unknown TCP traffic detected without corresponding DNS query: 19.37.51.49
Source: unknown TCP traffic detected without corresponding DNS query: 208.233.144.26
Source: unknown TCP traffic detected without corresponding DNS query: 54.41.170.171
Source: unknown TCP traffic detected without corresponding DNS query: 217.171.83.43
Source: unknown TCP traffic detected without corresponding DNS query: 179.26.154.158
Source: unknown TCP traffic detected without corresponding DNS query: 98.60.144.40
Source: unknown TCP traffic detected without corresponding DNS query: 181.156.238.221
Source: unknown TCP traffic detected without corresponding DNS query: 13.46.186.171
Source: unknown TCP traffic detected without corresponding DNS query: 27.77.33.53
Source: unknown TCP traffic detected without corresponding DNS query: 186.197.181.157
Source: unknown TCP traffic detected without corresponding DNS query: 221.253.219.9
Source: unknown TCP traffic detected without corresponding DNS query: 86.23.243.141
Source: unknown TCP traffic detected without corresponding DNS query: 217.134.208.149
Source: unknown TCP traffic detected without corresponding DNS query: 112.1.0.103
Source: unknown TCP traffic detected without corresponding DNS query: 176.25.19.129
Source: unknown TCP traffic detected without corresponding DNS query: 203.64.177.206
Source: unknown TCP traffic detected without corresponding DNS query: 89.62.238.247
Source: unknown TCP traffic detected without corresponding DNS query: 38.46.34.49
Source: unknown TCP traffic detected without corresponding DNS query: 193.195.180.86
Source: unknown TCP traffic detected without corresponding DNS query: 172.69.227.236
Source: unknown TCP traffic detected without corresponding DNS query: 85.253.53.57
Source: unknown TCP traffic detected without corresponding DNS query: 108.31.39.77
Source: unknown TCP traffic detected without corresponding DNS query: 203.231.234.124
Source: unknown TCP traffic detected without corresponding DNS query: 169.201.242.166
Source: unknown TCP traffic detected without corresponding DNS query: 5.104.148.237
Source: unknown TCP traffic detected without corresponding DNS query: 165.76.161.13
Source: unknown TCP traffic detected without corresponding DNS query: 31.37.123.68
Source: unknown TCP traffic detected without corresponding DNS query: 211.128.4.190
Source: unknown TCP traffic detected without corresponding DNS query: 253.49.98.164
Source: unknown TCP traffic detected without corresponding DNS query: 145.149.166.190
Source: unknown TCP traffic detected without corresponding DNS query: 105.246.16.77
Source: unknown TCP traffic detected without corresponding DNS query: 122.34.230.107
Source: unknown TCP traffic detected without corresponding DNS query: 83.113.136.199
Source: unknown TCP traffic detected without corresponding DNS query: 74.141.227.216
Source: unknown TCP traffic detected without corresponding DNS query: 191.241.145.50
Source: unknown TCP traffic detected without corresponding DNS query: 143.31.39.206
Source: unknown TCP traffic detected without corresponding DNS query: 172.42.75.157
Source: unknown TCP traffic detected without corresponding DNS query: 250.49.180.16
Source: unknown TCP traffic detected without corresponding DNS query: 254.6.5.190

System Summary

barindex
Source: 2DbzKHhgOH, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 2DbzKHhgOH, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 6223.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 6223.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 6242.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 6242.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 6256.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 6256.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 6226.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 6226.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 6260.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 6260.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 6227.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 6227.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 6234.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 6234.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 6251.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 6251.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6223, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6223, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6226, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6226, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6227, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6227, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6234, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6234, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6242, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6242, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6256, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6256, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6260, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 2DbzKHhgOH PID: 6260, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
Source: 2DbzKHhgOH, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 2DbzKHhgOH, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: 6223.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 6223.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: 6242.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 6242.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: 6256.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 6256.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: 6226.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 6226.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: 6260.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 6260.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: 6227.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 6227.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: 6234.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 6234.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: 6251.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 6251.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6223, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6223, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6226, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6226, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6227, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6227, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6234, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6234, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6242, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6242, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6256, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6256, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6260, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 2DbzKHhgOH PID: 6260, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
Source: ELF static info symbol of initial sample .symtab present: no
Source: /tmp/2DbzKHhgOH (PID: 6226) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: classification engine Classification label: mal76.troj.lin@0/0@0/0
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/491/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/793/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/772/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/796/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/774/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/797/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/777/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/799/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/658/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/912/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/759/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/936/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/918/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/1/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/761/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/785/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/884/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/720/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/721/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/788/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/789/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/800/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/801/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/847/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6232) File opened: /proc/904/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/491/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/793/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/772/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/796/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/774/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/797/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/777/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/799/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/658/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/912/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/759/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/936/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/918/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/1/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/761/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/785/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/884/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/720/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/721/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/788/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/789/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/800/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/801/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/847/fd Jump to behavior
Source: /tmp/2DbzKHhgOH (PID: 6226) File opened: /proc/904/fd Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 54828
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 39698
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 39834
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55020
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 39992
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55224
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40170
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55448
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40338
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55666
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40516
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40672
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 55858
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40822
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 56052
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 40984
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 56248
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 41152
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 56440
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 56628
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57026
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57174
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57320
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57462
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57602
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57758
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57912
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 58058
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 58194
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 58346
Source: /tmp/2DbzKHhgOH (PID: 6223) Queries kernel information via 'uname': Jump to behavior
Source: 2DbzKHhgOH, 6223.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6226.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6242.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6256.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6251.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6227.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6260.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6234.1.00005636a8392000.00005636a8417000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sparc
Source: 2DbzKHhgOH, 6223.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6226.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6242.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6256.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6251.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6227.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6260.1.00005636a8392000.00005636a8417000.rw-.sdmp, 2DbzKHhgOH, 6234.1.00005636a8392000.00005636a8417000.rw-.sdmp Binary or memory string: 6V!/etc/qemu-binfmt/sparc
Source: 2DbzKHhgOH, 6223.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6226.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6242.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6256.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6251.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6227.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6260.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6234.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sparc
Source: 2DbzKHhgOH, 6223.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6226.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6242.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6256.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6251.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6227.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6260.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp, 2DbzKHhgOH, 6234.1.00007ffdbfea2000.00007ffdbfec3000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sparc/tmp/2DbzKHhgOHSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/2DbzKHhgOH

Stealing of Sensitive Information

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 2DbzKHhgOH, type: SAMPLE
Source: Yara match File source: 6223.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6242.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6256.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6226.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6260.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6227.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6234.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6251.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 2DbzKHhgOH, type: SAMPLE
Source: Yara match File source: 6223.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6242.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6256.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6226.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6260.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6227.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6234.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6251.1.00007f4910011000.00007f4910023000.r-x.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs