MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a7682d1edc81925c3d7d2738db2283c742144d8321cfaf1888cdb66c1cd6ae83. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Tsunami


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: a7682d1edc81925c3d7d2738db2283c742144d8321cfaf1888cdb66c1cd6ae83
SHA3-384 hash: 38bf4c1ad2423250419bae957a8cb24e27b286d00fa9be74b392b3659e97ea4cc3000e7b6ae8e88947c905c7ecfa4357
SHA1 hash: 0f0a8ae96f0d5e05885450ef684f75397497b117
MD5 hash: 895a8e146f5e855018cb3ce5f85f0e45
humanhash: kansas-twelve-september-leopard
File name:pty3
Download: download sample
Signature Tsunami
File size:49'068 bytes
First seen:2026-01-26 01:24:39 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:o3QPPFqEChAfmWegsbYHsv2Aoku9d2p2hdjmlkk+6ncn1wnVkoxDP1X+sdSvndT+:R1COipYHsv2A7u9MpUQkkTnKO2C1usdv
TLSH T15C23022BBD470EC4E6F9DFF99F425B6A6852C4106A5333011D88FC8820B5EE554A7BF4
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf Tsunami

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
Mirai
Details
Mirai
a patched binary
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
custom
Botnet:
unknown
Number of open files:
11
Number of processes launched:
9
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Information Gathering
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=08ce9999-1900-0000-2743-bd71dc090000 pid=2524 /usr/bin/sudo guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531 /tmp/sample.bin mprotect-exec guuid=08ce9999-1900-0000-2743-bd71dc090000 pid=2524->guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531 execve guuid=5c9ee99b-1900-0000-2743-bd71e4090000 pid=2532 /usr/bin/dash guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=5c9ee99b-1900-0000-2743-bd71e4090000 pid=2532 execve guuid=59ab9e9f-1900-0000-2743-bd71ec090000 pid=2540 /usr/bin/dash guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=59ab9e9f-1900-0000-2743-bd71ec090000 pid=2540 execve guuid=5ca724a1-1900-0000-2743-bd71f0090000 pid=2544 /tmp/sample.bin guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=5ca724a1-1900-0000-2743-bd71f0090000 pid=2544 clone guuid=2be32ba1-1900-0000-2743-bd71f1090000 pid=2545 /tmp/sample.bin guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=2be32ba1-1900-0000-2743-bd71f1090000 pid=2545 clone guuid=62f62fa1-1900-0000-2743-bd71f2090000 pid=2546 /usr/bin/dash guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=62f62fa1-1900-0000-2743-bd71f2090000 pid=2546 execve guuid=c71e31a2-1900-0000-2743-bd71f9090000 pid=2553 /usr/bin/dash write-config guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=c71e31a2-1900-0000-2743-bd71f9090000 pid=2553 execve guuid=770590a2-1900-0000-2743-bd71fb090000 pid=2555 /usr/bin/dash guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=770590a2-1900-0000-2743-bd71fb090000 pid=2555 execve guuid=c2a12da3-1900-0000-2743-bd71fe090000 pid=2558 /usr/bin/dash guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=c2a12da3-1900-0000-2743-bd71fe090000 pid=2558 execve guuid=8e23caa3-1900-0000-2743-bd71010a0000 pid=2561 /usr/bin/dash guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=8e23caa3-1900-0000-2743-bd71010a0000 pid=2561 execve guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563 /tmp/sample.bin zombie guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563 clone guuid=f12867a4-1900-0000-2743-bd71040a0000 pid=2564 /tmp/sample.bin dns net send-data zombie guuid=a25cb79b-1900-0000-2743-bd71e3090000 pid=2531->guuid=f12867a4-1900-0000-2743-bd71040a0000 pid=2564 clone guuid=ebf5579c-1900-0000-2743-bd71e6090000 pid=2534 /usr/sbin/killall5 guuid=5c9ee99b-1900-0000-2743-bd71e4090000 pid=2532->guuid=ebf5579c-1900-0000-2743-bd71e6090000 pid=2534 execve guuid=a6b5c69f-1900-0000-2743-bd71ed090000 pid=2541 /usr/sbin/killall5 guuid=59ab9e9f-1900-0000-2743-bd71ec090000 pid=2540->guuid=a6b5c69f-1900-0000-2743-bd71ed090000 pid=2541 execve guuid=724e7ba1-1900-0000-2743-bd71f5090000 pid=2549 /usr/bin/cat guuid=62f62fa1-1900-0000-2743-bd71f2090000 pid=2546->guuid=724e7ba1-1900-0000-2743-bd71f5090000 pid=2549 execve guuid=895084a1-1900-0000-2743-bd71f6090000 pid=2550 /usr/bin/grep guuid=62f62fa1-1900-0000-2743-bd71f2090000 pid=2546->guuid=895084a1-1900-0000-2743-bd71f6090000 pid=2550 execve guuid=74f4bca2-1900-0000-2743-bd71fd090000 pid=2557 /usr/bin/cat guuid=770590a2-1900-0000-2743-bd71fb090000 pid=2555->guuid=74f4bca2-1900-0000-2743-bd71fd090000 pid=2557 execve guuid=b2f678a3-1900-0000-2743-bd71000a0000 pid=2560 /usr/bin/rm delete-file guuid=c2a12da3-1900-0000-2743-bd71fe090000 pid=2558->guuid=b2f678a3-1900-0000-2743-bd71000a0000 pid=2560 execve guuid=e27e05a4-1900-0000-2743-bd71020a0000 pid=2562 /usr/bin/touch guuid=8e23caa3-1900-0000-2743-bd71010a0000 pid=2561->guuid=e27e05a4-1900-0000-2743-bd71020a0000 pid=2562 execve guuid=96b56ba4-1900-0000-2743-bd71050a0000 pid=2565 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=96b56ba4-1900-0000-2743-bd71050a0000 pid=2565 execve guuid=b99c6ca5-1900-0000-2743-bd710c0a0000 pid=2572 /tmp/sample.bin guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=b99c6ca5-1900-0000-2743-bd710c0a0000 pid=2572 clone guuid=9ac471a5-1900-0000-2743-bd710d0a0000 pid=2573 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=9ac471a5-1900-0000-2743-bd710d0a0000 pid=2573 execve guuid=8a9539a6-1900-0000-2743-bd71130a0000 pid=2579 /usr/bin/dash write-config guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=8a9539a6-1900-0000-2743-bd71130a0000 pid=2579 execve guuid=115d8ba6-1900-0000-2743-bd71140a0000 pid=2580 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=115d8ba6-1900-0000-2743-bd71140a0000 pid=2580 execve guuid=9bbb15a7-1900-0000-2743-bd71180a0000 pid=2584 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=9bbb15a7-1900-0000-2743-bd71180a0000 pid=2584 execve guuid=df83aaa7-1900-0000-2743-bd711b0a0000 pid=2587 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=df83aaa7-1900-0000-2743-bd711b0a0000 pid=2587 execve guuid=98a44ba8-1900-0000-2743-bd711f0a0000 pid=2591 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=98a44ba8-1900-0000-2743-bd711f0a0000 pid=2591 execve guuid=b310eea8-1900-0000-2743-bd71230a0000 pid=2595 /tmp/sample.bin guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=b310eea8-1900-0000-2743-bd71230a0000 pid=2595 clone guuid=5e69f4a8-1900-0000-2743-bd71240a0000 pid=2596 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=5e69f4a8-1900-0000-2743-bd71240a0000 pid=2596 execve guuid=e6479ba9-1900-0000-2743-bd71280a0000 pid=2600 /usr/bin/dash write-config guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=e6479ba9-1900-0000-2743-bd71280a0000 pid=2600 execve guuid=da36d4a9-1900-0000-2743-bd712a0a0000 pid=2602 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=da36d4a9-1900-0000-2743-bd712a0a0000 pid=2602 execve guuid=f1a181aa-1900-0000-2743-bd712c0a0000 pid=2604 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=f1a181aa-1900-0000-2743-bd712c0a0000 pid=2604 execve guuid=896812ab-1900-0000-2743-bd712e0a0000 pid=2606 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=896812ab-1900-0000-2743-bd712e0a0000 pid=2606 execve guuid=9f40d0ab-1900-0000-2743-bd71310a0000 pid=2609 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=9f40d0ab-1900-0000-2743-bd71310a0000 pid=2609 execve guuid=d51b80ac-1900-0000-2743-bd71360a0000 pid=2614 /tmp/sample.bin guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=d51b80ac-1900-0000-2743-bd71360a0000 pid=2614 clone guuid=8cca85ac-1900-0000-2743-bd71370a0000 pid=2615 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=8cca85ac-1900-0000-2743-bd71370a0000 pid=2615 execve guuid=bb7224ad-1900-0000-2743-bd713c0a0000 pid=2620 /usr/bin/dash write-config guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=bb7224ad-1900-0000-2743-bd713c0a0000 pid=2620 execve guuid=1a8877ad-1900-0000-2743-bd713e0a0000 pid=2622 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=1a8877ad-1900-0000-2743-bd713e0a0000 pid=2622 execve guuid=4a3122ae-1900-0000-2743-bd71420a0000 pid=2626 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=4a3122ae-1900-0000-2743-bd71420a0000 pid=2626 execve guuid=eb319eae-1900-0000-2743-bd71450a0000 pid=2629 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=eb319eae-1900-0000-2743-bd71450a0000 pid=2629 execve guuid=4c9f1faf-1900-0000-2743-bd71480a0000 pid=2632 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=4c9f1faf-1900-0000-2743-bd71480a0000 pid=2632 execve guuid=d7cdabaf-1900-0000-2743-bd714c0a0000 pid=2636 /tmp/sample.bin guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=d7cdabaf-1900-0000-2743-bd714c0a0000 pid=2636 clone guuid=c64cafaf-1900-0000-2743-bd714d0a0000 pid=2637 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=c64cafaf-1900-0000-2743-bd714d0a0000 pid=2637 execve guuid=e5dd44b0-1900-0000-2743-bd71520a0000 pid=2642 /usr/bin/dash write-config guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=e5dd44b0-1900-0000-2743-bd71520a0000 pid=2642 execve guuid=f1cd85b0-1900-0000-2743-bd71540a0000 pid=2644 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=f1cd85b0-1900-0000-2743-bd71540a0000 pid=2644 execve guuid=e18e02b1-1900-0000-2743-bd71580a0000 pid=2648 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=e18e02b1-1900-0000-2743-bd71580a0000 pid=2648 execve guuid=e7f27cb1-1900-0000-2743-bd715c0a0000 pid=2652 /usr/bin/dash guuid=4cac5fa4-1900-0000-2743-bd71030a0000 pid=2563->guuid=e7f27cb1-1900-0000-2743-bd715c0a0000 pid=2652 execve bc1abfb0-de16-581f-98a7-6d4ec0d9684a 129.213.23.99:8080 guuid=f12867a4-1900-0000-2743-bd71040a0000 pid=2564->bc1abfb0-de16-581f-98a7-6d4ec0d9684a con 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=f12867a4-1900-0000-2743-bd71040a0000 pid=2564->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 84B 735e5286-0e46-5370-be58-d5ecc427f926 v.deutschland-zahlung.eu:8080 guuid=f12867a4-1900-0000-2743-bd71040a0000 pid=2564->735e5286-0e46-5370-be58-d5ecc427f926 send: 184B 86cd5be3-0346-5d91-a2e6-9812644be91f 138.197.78.18:8080 guuid=f12867a4-1900-0000-2743-bd71040a0000 pid=2564->86cd5be3-0346-5d91-a2e6-9812644be91f con 49ba9d23-2030-5a89-b301-3afe3a706f58 46.149.233.35:8080 guuid=f12867a4-1900-0000-2743-bd71040a0000 pid=2564->49ba9d23-2030-5a89-b301-3afe3a706f58 send: 172B guuid=80c1a1a4-1900-0000-2743-bd71060a0000 pid=2566 /usr/bin/dash guuid=f12867a4-1900-0000-2743-bd71040a0000 pid=2564->guuid=80c1a1a4-1900-0000-2743-bd71060a0000 pid=2566 execve guuid=6c9dafa4-1900-0000-2743-bd71080a0000 pid=2568 /usr/bin/cp write-file guuid=96b56ba4-1900-0000-2743-bd71050a0000 pid=2565->guuid=6c9dafa4-1900-0000-2743-bd71080a0000 pid=2568 execve guuid=3c1e39a5-1900-0000-2743-bd710a0a0000 pid=2570 /usr/bin/uname guuid=80c1a1a4-1900-0000-2743-bd71060a0000 pid=2566->guuid=3c1e39a5-1900-0000-2743-bd710a0a0000 pid=2570 execve guuid=f218bca5-1900-0000-2743-bd710f0a0000 pid=2575 /usr/bin/cat guuid=9ac471a5-1900-0000-2743-bd710d0a0000 pid=2573->guuid=f218bca5-1900-0000-2743-bd710f0a0000 pid=2575 execve guuid=c218c6a5-1900-0000-2743-bd71100a0000 pid=2576 /usr/bin/grep write-config guuid=9ac471a5-1900-0000-2743-bd710d0a0000 pid=2573->guuid=c218c6a5-1900-0000-2743-bd71100a0000 pid=2576 execve guuid=217ac0a6-1900-0000-2743-bd71160a0000 pid=2582 /usr/bin/cat guuid=115d8ba6-1900-0000-2743-bd71140a0000 pid=2580->guuid=217ac0a6-1900-0000-2743-bd71160a0000 pid=2582 execve guuid=5a6f63a7-1900-0000-2743-bd711a0a0000 pid=2586 /usr/bin/rm delete-file guuid=9bbb15a7-1900-0000-2743-bd71180a0000 pid=2584->guuid=5a6f63a7-1900-0000-2743-bd711a0a0000 pid=2586 execve guuid=84e9eea7-1900-0000-2743-bd711d0a0000 pid=2589 /usr/bin/touch guuid=df83aaa7-1900-0000-2743-bd711b0a0000 pid=2587->guuid=84e9eea7-1900-0000-2743-bd711d0a0000 pid=2589 execve guuid=ef1684a8-1900-0000-2743-bd71210a0000 pid=2593 /usr/bin/cp guuid=98a44ba8-1900-0000-2743-bd711f0a0000 pid=2591->guuid=ef1684a8-1900-0000-2743-bd71210a0000 pid=2593 execve guuid=b93628a9-1900-0000-2743-bd71260a0000 pid=2598 /usr/bin/cat guuid=5e69f4a8-1900-0000-2743-bd71240a0000 pid=2596->guuid=b93628a9-1900-0000-2743-bd71260a0000 pid=2598 execve guuid=585b2da9-1900-0000-2743-bd71270a0000 pid=2599 /usr/bin/grep write-config guuid=5e69f4a8-1900-0000-2743-bd71240a0000 pid=2596->guuid=585b2da9-1900-0000-2743-bd71270a0000 pid=2599 execve guuid=dc0411aa-1900-0000-2743-bd712b0a0000 pid=2603 /usr/bin/cat guuid=da36d4a9-1900-0000-2743-bd712a0a0000 pid=2602->guuid=dc0411aa-1900-0000-2743-bd712b0a0000 pid=2603 execve guuid=e939bdaa-1900-0000-2743-bd712d0a0000 pid=2605 /usr/bin/rm delete-file guuid=f1a181aa-1900-0000-2743-bd712c0a0000 pid=2604->guuid=e939bdaa-1900-0000-2743-bd712d0a0000 pid=2605 execve guuid=c1c860ab-1900-0000-2743-bd712f0a0000 pid=2607 /usr/bin/touch guuid=896812ab-1900-0000-2743-bd712e0a0000 pid=2606->guuid=c1c860ab-1900-0000-2743-bd712f0a0000 pid=2607 execve guuid=93dcfbab-1900-0000-2743-bd71330a0000 pid=2611 /usr/bin/cp write-file guuid=9f40d0ab-1900-0000-2743-bd71310a0000 pid=2609->guuid=93dcfbab-1900-0000-2743-bd71330a0000 pid=2611 execve guuid=586fb7ac-1900-0000-2743-bd71380a0000 pid=2616 /usr/bin/cat guuid=8cca85ac-1900-0000-2743-bd71370a0000 pid=2615->guuid=586fb7ac-1900-0000-2743-bd71380a0000 pid=2616 execve guuid=b97bbeac-1900-0000-2743-bd713a0a0000 pid=2618 /usr/bin/grep write-config guuid=8cca85ac-1900-0000-2743-bd71370a0000 pid=2615->guuid=b97bbeac-1900-0000-2743-bd713a0a0000 pid=2618 execve guuid=1337bbad-1900-0000-2743-bd71400a0000 pid=2624 /usr/bin/cat guuid=1a8877ad-1900-0000-2743-bd713e0a0000 pid=2622->guuid=1337bbad-1900-0000-2743-bd71400a0000 pid=2624 execve guuid=301250ae-1900-0000-2743-bd71430a0000 pid=2627 /usr/bin/rm delete-file guuid=4a3122ae-1900-0000-2743-bd71420a0000 pid=2626->guuid=301250ae-1900-0000-2743-bd71430a0000 pid=2627 execve guuid=bfe3d5ae-1900-0000-2743-bd71460a0000 pid=2630 /usr/bin/touch guuid=eb319eae-1900-0000-2743-bd71450a0000 pid=2629->guuid=bfe3d5ae-1900-0000-2743-bd71460a0000 pid=2630 execve guuid=5e8148af-1900-0000-2743-bd714a0a0000 pid=2634 /usr/bin/cp write-file guuid=4c9f1faf-1900-0000-2743-bd71480a0000 pid=2632->guuid=5e8148af-1900-0000-2743-bd714a0a0000 pid=2634 execve guuid=e774d6af-1900-0000-2743-bd714f0a0000 pid=2639 /usr/bin/cat guuid=c64cafaf-1900-0000-2743-bd714d0a0000 pid=2637->guuid=e774d6af-1900-0000-2743-bd714f0a0000 pid=2639 execve guuid=259cdaaf-1900-0000-2743-bd71500a0000 pid=2640 /usr/bin/grep write-config guuid=c64cafaf-1900-0000-2743-bd714d0a0000 pid=2637->guuid=259cdaaf-1900-0000-2743-bd71500a0000 pid=2640 execve guuid=c249acb0-1900-0000-2743-bd71560a0000 pid=2646 /usr/bin/cat guuid=f1cd85b0-1900-0000-2743-bd71540a0000 pid=2644->guuid=c249acb0-1900-0000-2743-bd71560a0000 pid=2646 execve guuid=41552eb1-1900-0000-2743-bd715a0a0000 pid=2650 /usr/bin/rm delete-file guuid=e18e02b1-1900-0000-2743-bd71580a0000 pid=2648->guuid=41552eb1-1900-0000-2743-bd715a0a0000 pid=2650 execve guuid=e01ca8b1-1900-0000-2743-bd715d0a0000 pid=2653 /usr/bin/touch guuid=e7f27cb1-1900-0000-2743-bd715c0a0000 pid=2652->guuid=e01ca8b1-1900-0000-2743-bd715d0a0000 pid=2653 execve
Result
Threat name:
Muhstik, Tsunami
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Executes the "crontab" command typically for achieving persistence
Explicitly modifies time stamps using the "touch" command
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample tries to persist itself using cron
Suricata IDS alerts for network traffic
Uses IRC for communication with a C&C
Uses known network protocols on non-standard ports
Writes identical ELF files to multiple locations
Yara detected Muhstik
Yara detected Tsunami
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1857375 Sample: pty3.elf Startdate: 26/01/2026 Architecture: LINUX Score: 100 109 46.149.233.35, 37380, 8080 MAGELLAN-ASRU Russian Federation 2->109 111 169.254.169.254, 80 USDOSUS Reserved 2->111 113 2 other IPs or domains 2->113 127 Suricata IDS alerts for network traffic 2->127 129 Malicious sample detected (through community Yara rule) 2->129 131 Antivirus detection for dropped file 2->131 133 6 other signatures 2->133 11 pty3.elf 2->11         started        13 python3.8 dpkg 2->13         started        signatures3 process4 process5 15 pty3.elf 11->15         started        17 pty3.elf 11->17         started        19 pty3.elf 11->19         started        21 8 other processes 11->21 process6 23 pty3.elf 15->23         started        25 pty3.elf 15->25         started        27 pty3.elf 15->27         started        38 25 other processes 15->38 29 pty3.elf sh 17->29         started        31 pty3.elf sh 19->31         started        33 sh touch 21->33         started        36 pty3.elf sh 21->36         started        40 6 other processes 21->40 signatures7 42 pty3.elf sh 23->42         started        44 pty3.elf sh 25->44         started        46 pty3.elf sh 27->46         started        48 sh crontab 29->48         started        58 4 other processes 29->58 52 sh crontab 31->52         started        115 Explicitly modifies time stamps using the "touch" command 33->115 54 sh uname 36->54         started        56 pty3.elf sh 38->56         started        60 24 other processes 38->60 process8 file9 62 sh crontab 42->62         started        74 4 other processes 42->74 66 sh crontab 44->66         started        76 4 other processes 44->76 68 sh crontab 46->68         started        78 4 other processes 46->78 91 /var/spool/cron/crontabs/tmp.s3QEnG, ASCII 48->91 dropped 117 Sample tries to persist itself using cron 48->117 119 Executes the "crontab" command typically for achieving persistence 48->119 70 sh crontab 56->70         started        80 4 other processes 56->80 72 sh crontab 58->72         started        93 /var/tmp/pty3.elf, ELF 60->93 dropped 95 /run/pty3.elf, ELF 60->95 dropped 97 /run/lock/pty3.elf, ELF 60->97 dropped 99 2 other malicious files 60->99 dropped 121 Writes identical ELF files to multiple locations 60->121 123 Explicitly modifies time stamps using the "touch" command 60->123 signatures10 process11 file12 101 /var/spool/cron/crontabs/tmp.yEIc6u, ASCII 62->101 dropped 135 Sample tries to persist itself using cron 62->135 137 Executes the "crontab" command typically for achieving persistence 62->137 103 /var/spool/cron/crontabs/tmp.tRr1i6, ASCII 66->103 dropped 105 /var/spool/cron/crontabs/tmp.1xvYSx, ASCII 68->105 dropped 107 /var/spool/cron/crontabs/tmp.VdF21Z, ASCII 70->107 dropped 82 sh crontab 74->82         started        85 sh crontab 76->85         started        87 sh crontab 78->87         started        89 sh crontab 80->89         started        signatures13 process14 signatures15 125 Executes the "crontab" command typically for achieving persistence 82->125
Threat name:
Linux.Trojan.Tsunami
Status:
Malicious
First seen:
2025-02-21 07:23:07 UTC
File Type:
ELF64 Little (Exe)
AV detection:
21 of 36 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
defense_evasion discovery execution linux persistence privilege_escalation upx
Behaviour
Reads runtime system information
Writes file to shm directory
Writes file to tmp directory
Changes its process name
Indicator Removal: Timestomp
UPX packed file
Creates/modifies Cron job
Enumerates running processes
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Trojan_Gafgyt_4d81ad42
Author:Elastic Security
Rule name:Linux_Trojan_Tsunami_22646c0d
Author:Elastic Security
Rule name:Linux_Trojan_Tsunami_97288af8
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Tsunami

elf a7682d1edc81925c3d7d2738db2283c742144d8321cfaf1888cdb66c1cd6ae83

(this sample)

Comments