Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bot.x86_64.elf

Overview

General Information

Sample Name:bot.x86_64.elf
Analysis ID:1352210
MD5:91cf7c980da45a97653904fe8da5334b
SHA1:3db48bf9036d5a4882a1958260b83f956c911cb7
SHA256:bb81e6a77d5b49c90be0d8616c0b58f85890668482512c8d567c9dcb0adadc04
Infos:

Detection

Mirai
Score:96
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Detected Mirai
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Machine Learning detection for sample
Connects to many ports of the same IP (likely port scanning)
Yara signature match
Sample has stripped symbol table
Found strings indicative of a multi-platform dropper
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable

Classification

Joe Sandbox Version:38.0.0 Ammolite
Analysis ID:1352210
Start date and time:2023-12-02 19:45:14 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample file name:bot.x86_64.elf
Detection:MAL
Classification:mal96.troj.linELF@0/0@21/0
Command:/tmp/bot.x86_64.elf
PID:5494
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
bot.x86_64.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
    bot.x86_64.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x163c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x163dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x163f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16404:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16418:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1642c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16440:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16454:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16468:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1647c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16490:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x164a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x164b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x164cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x164e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x164f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16508:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1651c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16530:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16544:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x16558:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    bot.x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
    • 0xcc10:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
    bot.x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
    • 0xd3df:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
    bot.x86_64.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
    • 0x9f06:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    • 0xf2f0:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    Click to see the 11 entries
    SourceRuleDescriptionAuthorStrings
    5494.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      5494.1.0000000000400000.0000000000419000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x163c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x163dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x163f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16404:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16418:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1642c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16440:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16454:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16468:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1647c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16490:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x164a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x164b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x164cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x164e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x164f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16508:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1651c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16530:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16544:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16558:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5494.1.0000000000400000.0000000000419000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0xcc10:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      5494.1.0000000000400000.0000000000419000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0xd3df:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      5494.1.0000000000400000.0000000000419000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
      • 0x9f06:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
      • 0xf2f0:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
      Click to see the 13 entries
      Timestamp:192.168.2.1445.142.182.9535218439572030490 12/02/23-19:46:56.357195
      SID:2030490
      Source Port:35218
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535228439572030490 12/02/23-19:47:23.735122
      SID:2030490
      Source Port:35228
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535198439572030490 12/02/23-19:46:05.606499
      SID:2030490
      Source Port:35198
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535216439572030490 12/02/23-19:46:48.882722
      SID:2030490
      Source Port:35216
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535206439572030490 12/02/23-19:46:26.501103
      SID:2030490
      Source Port:35206
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535214439572030490 12/02/23-19:46:44.406725
      SID:2030490
      Source Port:35214
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535224439572030490 12/02/23-19:47:10.780577
      SID:2030490
      Source Port:35224
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.2345.142.182.9539044439572030490 12/02/23-19:45:49.870680
      SID:2030490
      Source Port:39044
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535226439572030490 12/02/23-19:47:21.260190
      SID:2030490
      Source Port:35226
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535236439572030490 12/02/23-19:47:54.641375
      SID:2030490
      Source Port:35236
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535204439572030490 12/02/23-19:46:23.024928
      SID:2030490
      Source Port:35204
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535210439572030490 12/02/23-19:46:33.453722
      SID:2030490
      Source Port:35210
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535220439572030490 12/02/23-19:46:58.831615
      SID:2030490
      Source Port:35220
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535232439572030490 12/02/23-19:47:35.688620
      SID:2030490
      Source Port:35232
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:45.142.182.95192.168.2.2343957390442030489 12/02/23-19:47:44.921599
      SID:2030489
      Source Port:43957
      Destination Port:39044
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535212439572030490 12/02/23-19:46:41.929620
      SID:2030490
      Source Port:35212
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535230439572030490 12/02/23-19:47:30.210203
      SID:2030490
      Source Port:35230
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535234439572030490 12/02/23-19:47:46.168228
      SID:2030490
      Source Port:35234
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535202439572030490 12/02/23-19:46:19.554567
      SID:2030490
      Source Port:35202
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535196439572030490 12/02/23-19:45:55.135725
      SID:2030490
      Source Port:35196
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535222439572030490 12/02/23-19:47:04.308097
      SID:2030490
      Source Port:35222
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535200439572030490 12/02/23-19:46:15.078790
      SID:2030490
      Source Port:35200
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.1445.142.182.9535208439572030490 12/02/23-19:46:28.979158
      SID:2030490
      Source Port:35208
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: bot.x86_64.elfAvira: detected
      Source: bot.x86_64.elfReversingLabs: Detection: 64%
      Source: bot.x86_64.elfVirustotal: Detection: 52%Perma Link
      Source: bot.x86_64.elfJoe Sandbox ML: detected
      Source: bot.x86_64.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

      Networking

      barindex
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:39044 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 45.142.182.95:43957 -> 192.168.2.23:39044
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35196 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35198 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35200 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35202 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35204 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35206 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35208 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35210 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35212 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35214 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35216 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35218 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35220 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35222 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35224 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35226 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35228 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35230 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35232 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35234 -> 45.142.182.95:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:35236 -> 45.142.182.95:43957
      Source: global trafficTCP traffic: 45.142.182.95 ports 43957,3,4,5,7,9
      Source: global trafficTCP traffic: 192.168.2.14:35196 -> 45.142.182.95:43957
      Source: unknownDNS traffic detected: queries for: botnet.shoprbx.com

      System Summary

      barindex
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
      Source: Process Memory Space: bot.x86_64.elf PID: 5494, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
      Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
      Source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
      Source: Process Memory Space: bot.x86_64.elf PID: 5494, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: Initial sampleString containing 'busybox' found: /bin/busybox
      Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
      Source: classification engineClassification label: mal96.troj.linELF@0/0@21/0
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/917/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/11/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/12/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/13/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/14/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/15/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/16/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3770/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/17/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3771/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/18/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3772/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/19/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/1593/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/240/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/120/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3094/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/121/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/242/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3406/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/1/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/122/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/243/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/2/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/123/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/244/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/1589/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/124/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/245/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/1588/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/125/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/4/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/246/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3402/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/126/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/5/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/247/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/127/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/6/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/248/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/128/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/7/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/249/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/8/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/129/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/800/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/9/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/801/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/803/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/20/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/806/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/21/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/807/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/928/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/22/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/23/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/24/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/25/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/26/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/27/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/28/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/29/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3420/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/490/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/250/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/130/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/251/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/131/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/252/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/132/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/253/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/254/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/255/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/135/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/256/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/1599/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/257/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/378/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/258/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3412/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/259/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/3773/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/30/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/35/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/1371/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/260/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/261/cmdlineJump to behavior
      Source: /tmp/bot.x86_64.elf (PID: 5496)File opened: /proc/262/cmdlineJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
      Source: Yara matchFile source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 5494, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
      Source: Yara matchFile source: 5494.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 5494, type: MEMORYSTR
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
      Valid Accounts1
      Scripting
      Path InterceptionPath Interception1
      Scripting
      1
      OS Credential Dumping
      System Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Non-Application Layer Protocol
      SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
      Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Application Layer Protocol
      Data Encrypted for ImpactDNS ServerEmail Addresses
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      bot.x86_64.elf65%ReversingLabsLinux.Trojan.Mirai
      bot.x86_64.elf100%AviraEXP/ELF.Mirai.Gen.Z.A
      bot.x86_64.elf100%Joe Sandbox ML
      bot.x86_64.elf52%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      botnet.shoprbx.com10%VirustotalBrowse
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      botnet.shoprbx.com
      45.142.182.95
      truetrueunknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      45.142.182.95
      botnet.shoprbx.comGermany
      207959XSSERVERNLtrue
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      45.142.182.95bot.arm7.elfGet hashmaliciousMiraiBrowse
        bot.arm5.elfGet hashmaliciousMiraiBrowse
          bot.mpsl.elfGet hashmaliciousMiraiBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            botnet.shoprbx.combot.arm7.elfGet hashmaliciousMiraiBrowse
            • 45.142.182.95
            bot.arm5.elfGet hashmaliciousMiraiBrowse
            • 45.142.182.95
            bot.mpsl.elfGet hashmaliciousMiraiBrowse
            • 45.142.182.95
            6tD7vXVSda.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            gsFxMe3HhC.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            bApst4aAEZ.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            top1hbt.mips.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            top1hbt.mpsl.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            top1hbt.x86.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            top1hbt.x86_64.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            top1hbt.arm7.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            top1hbt.arm.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            top1hbt.arm5.elfGet hashmaliciousMiraiBrowse
            • 91.92.244.70
            4dxWfgCK6v.elfGet hashmaliciousMiraiBrowse
            • 194.180.49.237
            top1hbt.mpsl.elfGet hashmaliciousMiraiBrowse
            • 194.180.49.237
            top1hbt.x86.elfGet hashmaliciousMiraiBrowse
            • 194.180.49.237
            top1hbt.arm7.elfGet hashmaliciousMiraiBrowse
            • 194.180.49.237
            top1hbt.arm.elfGet hashmaliciousMiraiBrowse
            • 194.180.49.237
            top1hbt.arm5.elfGet hashmaliciousMiraiBrowse
            • 194.180.49.237
            top1hbt.mips.elfGet hashmaliciousMiraiBrowse
            • 194.180.49.237
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            XSSERVERNLbot.arm7.elfGet hashmaliciousMiraiBrowse
            • 45.142.182.95
            bot.arm5.elfGet hashmaliciousMiraiBrowse
            • 45.142.182.95
            bot.mpsl.elfGet hashmaliciousMiraiBrowse
            • 45.142.182.95
            I3jWg7oPwM.exeGet hashmaliciousXmrigBrowse
            • 45.142.182.146
            file.exeGet hashmaliciousUnknownBrowse
            • 45.142.182.146
            http://www.ttin1.blogspot.huGet hashmaliciousUnknownBrowse
            • 195.62.46.135
            http://www.jjiklo9988.blogspot.fiGet hashmaliciousUnknownBrowse
            • 195.62.46.135
            mipsel-20221002-2102.elfGet hashmaliciousMoobotBrowse
            • 45.142.182.116
            x86_64-20221002-2102.elfGet hashmaliciousMoobotBrowse
            • 45.142.182.116
            mips-20221002-2102.elfGet hashmaliciousMoobotBrowse
            • 45.142.182.116
            i686-20221002-2102.elfGet hashmaliciousMoobotBrowse
            • 45.142.182.116
            arm6-20221002-2102.elfGet hashmaliciousMirai, MoobotBrowse
            • 45.142.182.116
            arm7-20221002-2102.elfGet hashmaliciousMirai, MoobotBrowse
            • 45.142.182.116
            arm-20221002-2102.elfGet hashmaliciousMoobotBrowse
            • 45.142.182.116
            x86Get hashmaliciousMiraiBrowse
            • 195.62.33.226
            59716B314BA0D53B7E8DE32A73AF01B7B383834BF038C.exeGet hashmaliciousRedLine SocelarsBrowse
            • 45.142.182.152
            FE3AE99417E0D632995AD5CEECCC4C0B308B8A30D2C93.exeGet hashmaliciousNitol RedLine SmokeLoader Socelars VidarBrowse
            • 45.142.182.152
            lr11Y0eF0m.exeGet hashmaliciousMetasploit Raccoon RedLine Socelars VidarBrowse
            • 45.142.182.152
            setup_x86_x64_install.exeGet hashmaliciousBackstage Stealer SocelarsBrowse
            • 45.142.182.152
            5AHyELsVLZ.exeGet hashmaliciousMetasploit RedLine Socelars VidarBrowse
            • 45.142.182.152
            No context
            No context
            No created / dropped files found
            File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
            Entropy (8bit):5.223363243131582
            TrID:
            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
            File name:bot.x86_64.elf
            File size:139'576 bytes
            MD5:91cf7c980da45a97653904fe8da5334b
            SHA1:3db48bf9036d5a4882a1958260b83f956c911cb7
            SHA256:bb81e6a77d5b49c90be0d8616c0b58f85890668482512c8d567c9dcb0adadc04
            SHA512:95c47b5e340e4149b57d53845a3c66f549c129da79fa38c2055c75130b1abcebab56a877258ffa528332d62811d446f39ff1ebbfd248ef2f092af6afbfa7460c
            SSDEEP:3072:tGtwnNiaOnUTLFKPT9OSQ7AOaogjV2iZlBWCgGiA3QPdL:tGtwnNiaOnUTFuLyW3QPd
            TLSH:8FD33A17B5C180FDC4DAC1B44F9EF53ADD32B1AC1238B16B2BD4AA221E4AE315F1DA50
            File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................Q.......Q.....x....... ...............Q.td....................................................H...._.....]..H........

            ELF header

            Class:ELF64
            Data:2's complement, little endian
            Version:1 (current)
            Machine:Advanced Micro Devices X86-64
            Version Number:0x1
            Type:EXEC (Executable file)
            OS/ABI:UNIX - System V
            ABI Version:0
            Entry Point Address:0x400194
            Flags:0x0
            ELF Header Size:64
            Program Header Offset:64
            Program Header Size:56
            Number of Program Headers:3
            Section Header Offset:138936
            Section Header Size:64
            Number of Section Headers:10
            Header String Table Index:9
            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
            NULL0x00x00x00x00x0000
            .initPROGBITS0x4000e80xe80x130x00x6AX001
            .textPROGBITS0x4001000x1000x15dd60x00x6AX0016
            .finiPROGBITS0x415ed60x15ed60xe0x00x6AX001
            .rodataPROGBITS0x415f000x15f000x30c00x00x2A0032
            .ctorsPROGBITS0x5190000x190000x180x00x3WA008
            .dtorsPROGBITS0x5190180x190180x100x00x3WA008
            .dataPROGBITS0x5190400x190400x8e380x00x3WA0032
            .bssNOBITS0x521e800x21e780x72a00x00x3WA0032
            .shstrtabSTRTAB0x00x21e780x3e0x00x0001
            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
            LOAD0x00x4000000x4000000x18fc00x18fc06.39700x5R E0x100000.init .text .fini .rodata
            LOAD0x190000x5190000x5190000x8e780x101200.22720x6RW 0x100000.ctors .dtors .data .bss
            GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            192.168.2.1445.142.182.9535218439572030490 12/02/23-19:46:56.357195TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3521843957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535228439572030490 12/02/23-19:47:23.735122TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3522843957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535198439572030490 12/02/23-19:46:05.606499TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3519843957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535216439572030490 12/02/23-19:46:48.882722TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3521643957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535206439572030490 12/02/23-19:46:26.501103TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3520643957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535214439572030490 12/02/23-19:46:44.406725TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3521443957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535224439572030490 12/02/23-19:47:10.780577TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3522443957192.168.2.1445.142.182.95
            192.168.2.2345.142.182.9539044439572030490 12/02/23-19:45:49.870680TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3904443957192.168.2.2345.142.182.95
            192.168.2.1445.142.182.9535226439572030490 12/02/23-19:47:21.260190TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3522643957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535236439572030490 12/02/23-19:47:54.641375TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3523643957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535204439572030490 12/02/23-19:46:23.024928TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3520443957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535210439572030490 12/02/23-19:46:33.453722TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3521043957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535220439572030490 12/02/23-19:46:58.831615TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3522043957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535232439572030490 12/02/23-19:47:35.688620TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3523243957192.168.2.1445.142.182.95
            45.142.182.95192.168.2.2343957390442030489 12/02/23-19:47:44.921599TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response439573904445.142.182.95192.168.2.23
            192.168.2.1445.142.182.9535212439572030490 12/02/23-19:46:41.929620TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3521243957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535230439572030490 12/02/23-19:47:30.210203TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3523043957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535234439572030490 12/02/23-19:47:46.168228TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3523443957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535202439572030490 12/02/23-19:46:19.554567TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3520243957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535196439572030490 12/02/23-19:45:55.135725TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3519643957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535222439572030490 12/02/23-19:47:04.308097TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3522243957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535200439572030490 12/02/23-19:46:15.078790TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3520043957192.168.2.1445.142.182.95
            192.168.2.1445.142.182.9535208439572030490 12/02/23-19:46:28.979158TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3520843957192.168.2.1445.142.182.95
            TimestampSource PortDest PortSource IPDest IP
            Dec 2, 2023 19:45:54.949898958 CET3519643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:45:55.135591984 CET439573519645.142.182.95192.168.2.14
            Dec 2, 2023 19:45:55.135660887 CET3519643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:45:55.135725021 CET3519643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:45:55.321465969 CET439573519645.142.182.95192.168.2.14
            Dec 2, 2023 19:45:55.321482897 CET439573519645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:05.420305014 CET3519843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:05.606365919 CET439573519845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:05.606498957 CET3519843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:05.606498957 CET3519843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:05.792263031 CET439573519845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:05.792315006 CET439573519845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:05.792557955 CET3519843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:05.978171110 CET439573519845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:14.891329050 CET3520043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:15.078573942 CET439573520045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:15.078701973 CET3520043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:15.078789949 CET3520043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:15.266144037 CET439573520045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:15.266326904 CET439573520045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:15.266470909 CET3520043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:15.454747915 CET439573520045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:19.366071939 CET3520243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:19.554398060 CET439573520245.142.182.95192.168.2.14
            Dec 2, 2023 19:46:19.554531097 CET3520243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:19.554567099 CET3520243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:19.742054939 CET439573520245.142.182.95192.168.2.14
            Dec 2, 2023 19:46:19.742129087 CET439573520245.142.182.95192.168.2.14
            Dec 2, 2023 19:46:19.742253065 CET3520243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:19.929790974 CET439573520245.142.182.95192.168.2.14
            Dec 2, 2023 19:46:22.841707945 CET3520443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:23.024758101 CET439573520445.142.182.95192.168.2.14
            Dec 2, 2023 19:46:23.024868965 CET3520443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:23.024928093 CET3520443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:23.208106041 CET439573520445.142.182.95192.168.2.14
            Dec 2, 2023 19:46:23.208159924 CET439573520445.142.182.95192.168.2.14
            Dec 2, 2023 19:46:26.311851025 CET3520643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:26.500907898 CET439573520645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:26.501040936 CET3520643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:26.501102924 CET3520643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:26.690186977 CET439573520645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:26.690588951 CET439573520645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:26.690701962 CET3520643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:26.879911900 CET439573520645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:28.791131020 CET3520843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:28.978940010 CET439573520845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:28.979156971 CET3520843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:28.979157925 CET3520843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:29.166707039 CET439573520845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:29.166764021 CET439573520845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:29.166989088 CET3520843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:29.354561090 CET439573520845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:33.266102076 CET3521043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:33.453551054 CET439573521045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:33.453691006 CET3521043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:33.453722000 CET3521043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:33.641179085 CET439573521045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:33.641376972 CET439573521045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:33.641504049 CET3521043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:33.829015970 CET439573521045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:41.741626978 CET3521243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:41.929424047 CET439573521245.142.182.95192.168.2.14
            Dec 2, 2023 19:46:41.929567099 CET3521243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:41.929620028 CET3521243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:42.117387056 CET439573521245.142.182.95192.168.2.14
            Dec 2, 2023 19:46:42.117451906 CET439573521245.142.182.95192.168.2.14
            Dec 2, 2023 19:46:42.117575884 CET3521243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:42.305653095 CET439573521245.142.182.95192.168.2.14
            Dec 2, 2023 19:46:44.218446016 CET3521443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:44.406580925 CET439573521445.142.182.95192.168.2.14
            Dec 2, 2023 19:46:44.406724930 CET3521443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:44.406724930 CET3521443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:44.594501019 CET439573521445.142.182.95192.168.2.14
            Dec 2, 2023 19:46:44.594732046 CET439573521445.142.182.95192.168.2.14
            Dec 2, 2023 19:46:44.594896078 CET3521443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:44.782623053 CET439573521445.142.182.95192.168.2.14
            Dec 2, 2023 19:46:48.694627047 CET3521643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:48.882487059 CET439573521645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:48.882654905 CET3521643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:48.882721901 CET3521643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:49.070494890 CET439573521645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:49.070561886 CET439573521645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:49.070674896 CET3521643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:49.261153936 CET439573521645.142.182.95192.168.2.14
            Dec 2, 2023 19:46:56.169456005 CET3521843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:56.357043982 CET439573521845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:56.357144117 CET3521843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:56.357194901 CET3521843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:56.544827938 CET439573521845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:56.545093060 CET439573521845.142.182.95192.168.2.14
            Dec 2, 2023 19:46:58.644198895 CET3522043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:58.831402063 CET439573522045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:58.831614971 CET3522043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:58.831614971 CET3522043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:59.018812895 CET439573522045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:59.018867016 CET439573522045.142.182.95192.168.2.14
            Dec 2, 2023 19:46:59.019113064 CET3522043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:46:59.207969904 CET439573522045.142.182.95192.168.2.14
            Dec 2, 2023 19:47:04.121606112 CET3522243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:04.307715893 CET439573522245.142.182.95192.168.2.14
            Dec 2, 2023 19:47:04.307861090 CET3522243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:04.308096886 CET3522243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:04.493648052 CET439573522245.142.182.95192.168.2.14
            Dec 2, 2023 19:47:04.493685961 CET439573522245.142.182.95192.168.2.14
            Dec 2, 2023 19:47:04.493860960 CET3522243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:04.679424047 CET439573522245.142.182.95192.168.2.14
            Dec 2, 2023 19:47:10.592873096 CET3522443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:10.780324936 CET439573522445.142.182.95192.168.2.14
            Dec 2, 2023 19:47:10.780472994 CET3522443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:10.780576944 CET3522443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:10.968332052 CET439573522445.142.182.95192.168.2.14
            Dec 2, 2023 19:47:10.968513012 CET439573522445.142.182.95192.168.2.14
            Dec 2, 2023 19:47:10.968858004 CET3522443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:11.156500101 CET439573522445.142.182.95192.168.2.14
            Dec 2, 2023 19:47:21.072235107 CET3522643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:21.259995937 CET439573522645.142.182.95192.168.2.14
            Dec 2, 2023 19:47:21.260190010 CET3522643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:21.260190010 CET3522643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:21.448153973 CET439573522645.142.182.95192.168.2.14
            Dec 2, 2023 19:47:21.448287964 CET439573522645.142.182.95192.168.2.14
            Dec 2, 2023 19:47:21.448393106 CET3522643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:21.636466980 CET439573522645.142.182.95192.168.2.14
            Dec 2, 2023 19:47:23.548407078 CET3522843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:23.734862089 CET439573522845.142.182.95192.168.2.14
            Dec 2, 2023 19:47:23.734983921 CET3522843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:23.735121965 CET3522843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:23.920739889 CET439573522845.142.182.95192.168.2.14
            Dec 2, 2023 19:47:23.920763016 CET439573522845.142.182.95192.168.2.14
            Dec 2, 2023 19:47:23.921020031 CET3522843957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:24.106637001 CET439573522845.142.182.95192.168.2.14
            Dec 2, 2023 19:47:30.024246931 CET3523043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:30.210000038 CET439573523045.142.182.95192.168.2.14
            Dec 2, 2023 19:47:30.210202932 CET3523043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:30.210202932 CET3523043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:30.396218061 CET439573523045.142.182.95192.168.2.14
            Dec 2, 2023 19:47:30.396634102 CET439573523045.142.182.95192.168.2.14
            Dec 2, 2023 19:47:30.396770954 CET3523043957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:30.582436085 CET439573523045.142.182.95192.168.2.14
            Dec 2, 2023 19:47:35.500756025 CET3523243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:35.688426018 CET439573523245.142.182.95192.168.2.14
            Dec 2, 2023 19:47:35.688620090 CET3523243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:35.688620090 CET3523243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:35.876831055 CET439573523245.142.182.95192.168.2.14
            Dec 2, 2023 19:47:35.876934052 CET439573523245.142.182.95192.168.2.14
            Dec 2, 2023 19:47:35.877055883 CET3523243957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:36.064691067 CET439573523245.142.182.95192.168.2.14
            Dec 2, 2023 19:47:45.976639032 CET3523443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:46.167957067 CET439573523445.142.182.95192.168.2.14
            Dec 2, 2023 19:47:46.168227911 CET3523443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:46.168227911 CET3523443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:46.356190920 CET439573523445.142.182.95192.168.2.14
            Dec 2, 2023 19:47:46.356252909 CET439573523445.142.182.95192.168.2.14
            Dec 2, 2023 19:47:46.356367111 CET3523443957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:46.544195890 CET439573523445.142.182.95192.168.2.14
            Dec 2, 2023 19:47:54.455372095 CET3523643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:54.641146898 CET439573523645.142.182.95192.168.2.14
            Dec 2, 2023 19:47:54.641283035 CET3523643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:54.641375065 CET3523643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:54.829184055 CET439573523645.142.182.95192.168.2.14
            Dec 2, 2023 19:47:54.829216003 CET439573523645.142.182.95192.168.2.14
            Dec 2, 2023 19:47:54.829379082 CET3523643957192.168.2.1445.142.182.95
            Dec 2, 2023 19:47:55.016756058 CET439573523645.142.182.95192.168.2.14
            TimestampSource PortDest PortSource IPDest IP
            Dec 2, 2023 19:45:54.850651979 CET3677053192.168.2.148.8.8.8
            Dec 2, 2023 19:45:54.949796915 CET53367708.8.8.8192.168.2.14
            Dec 2, 2023 19:46:05.321459055 CET3568653192.168.2.148.8.8.8
            Dec 2, 2023 19:46:05.420067072 CET53356868.8.8.8192.168.2.14
            Dec 2, 2023 19:46:14.792263031 CET5591153192.168.2.148.8.8.8
            Dec 2, 2023 19:46:14.891087055 CET53559118.8.8.8192.168.2.14
            Dec 2, 2023 19:46:19.266458988 CET6011353192.168.2.148.8.8.8
            Dec 2, 2023 19:46:19.365917921 CET53601138.8.8.8192.168.2.14
            Dec 2, 2023 19:46:22.742366076 CET4147453192.168.2.148.8.8.8
            Dec 2, 2023 19:46:22.841555119 CET53414748.8.8.8192.168.2.14
            Dec 2, 2023 19:46:26.208388090 CET3909553192.168.2.148.8.8.8
            Dec 2, 2023 19:46:26.311532974 CET53390958.8.8.8192.168.2.14
            Dec 2, 2023 19:46:28.691006899 CET4566953192.168.2.148.8.8.8
            Dec 2, 2023 19:46:28.790851116 CET53456698.8.8.8192.168.2.14
            Dec 2, 2023 19:46:33.167052031 CET5563053192.168.2.148.8.8.8
            Dec 2, 2023 19:46:33.265832901 CET53556308.8.8.8192.168.2.14
            Dec 2, 2023 19:46:41.641427040 CET4027353192.168.2.148.8.8.8
            Dec 2, 2023 19:46:41.741380930 CET53402738.8.8.8192.168.2.14
            Dec 2, 2023 19:46:44.117726088 CET3580653192.168.2.148.8.8.8
            Dec 2, 2023 19:46:44.218206882 CET53358068.8.8.8192.168.2.14
            Dec 2, 2023 19:46:48.595009089 CET3728853192.168.2.148.8.8.8
            Dec 2, 2023 19:46:48.694453955 CET53372888.8.8.8192.168.2.14
            Dec 2, 2023 19:46:56.070653915 CET3959353192.168.2.148.8.8.8
            Dec 2, 2023 19:46:56.169245005 CET53395938.8.8.8192.168.2.14
            Dec 2, 2023 19:46:58.545422077 CET4320353192.168.2.148.8.8.8
            Dec 2, 2023 19:46:58.643924952 CET53432038.8.8.8192.168.2.14
            Dec 2, 2023 19:47:04.018976927 CET5597253192.168.2.148.8.8.8
            Dec 2, 2023 19:47:04.121455908 CET53559728.8.8.8192.168.2.14
            Dec 2, 2023 19:47:10.493916035 CET4714953192.168.2.148.8.8.8
            Dec 2, 2023 19:47:10.592704058 CET53471498.8.8.8192.168.2.14
            Dec 2, 2023 19:47:20.968684912 CET5382553192.168.2.148.8.8.8
            Dec 2, 2023 19:47:21.072074890 CET53538258.8.8.8192.168.2.14
            Dec 2, 2023 19:47:23.448599100 CET4705953192.168.2.148.8.8.8
            Dec 2, 2023 19:47:23.548245907 CET53470598.8.8.8192.168.2.14
            Dec 2, 2023 19:47:29.920955896 CET3319053192.168.2.148.8.8.8
            Dec 2, 2023 19:47:30.024058104 CET53331908.8.8.8192.168.2.14
            Dec 2, 2023 19:47:35.396758080 CET5675153192.168.2.148.8.8.8
            Dec 2, 2023 19:47:35.500417948 CET53567518.8.8.8192.168.2.14
            Dec 2, 2023 19:47:45.876914024 CET3523853192.168.2.148.8.8.8
            Dec 2, 2023 19:47:45.976305962 CET53352388.8.8.8192.168.2.14
            Dec 2, 2023 19:47:54.356338978 CET5573253192.168.2.148.8.8.8
            Dec 2, 2023 19:47:54.455149889 CET53557328.8.8.8192.168.2.14
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Dec 2, 2023 19:45:54.850651979 CET192.168.2.148.8.8.80xe722Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:05.321459055 CET192.168.2.148.8.8.80x3d22Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:14.792263031 CET192.168.2.148.8.8.80x82efStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:19.266458988 CET192.168.2.148.8.8.80x4deeStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:22.742366076 CET192.168.2.148.8.8.80x6b23Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:26.208388090 CET192.168.2.148.8.8.80x68e5Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:28.691006899 CET192.168.2.148.8.8.80x7320Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:33.167052031 CET192.168.2.148.8.8.80xae01Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:41.641427040 CET192.168.2.148.8.8.80x231aStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:44.117726088 CET192.168.2.148.8.8.80x1780Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:48.595009089 CET192.168.2.148.8.8.80x8e6aStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:56.070653915 CET192.168.2.148.8.8.80x418eStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:58.545422077 CET192.168.2.148.8.8.80xb4cfStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:04.018976927 CET192.168.2.148.8.8.80x60c3Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:10.493916035 CET192.168.2.148.8.8.80x48b8Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:20.968684912 CET192.168.2.148.8.8.80xe5f2Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:23.448599100 CET192.168.2.148.8.8.80x2f7eStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:29.920955896 CET192.168.2.148.8.8.80x385fStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:35.396758080 CET192.168.2.148.8.8.80x932aStandard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:45.876914024 CET192.168.2.148.8.8.80x801Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:54.356338978 CET192.168.2.148.8.8.80x3ba7Standard query (0)botnet.shoprbx.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Dec 2, 2023 19:45:54.949796915 CET8.8.8.8192.168.2.140xe722No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:05.420067072 CET8.8.8.8192.168.2.140x3d22No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:14.891087055 CET8.8.8.8192.168.2.140x82efNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:19.365917921 CET8.8.8.8192.168.2.140x4deeNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:22.841555119 CET8.8.8.8192.168.2.140x6b23No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:26.311532974 CET8.8.8.8192.168.2.140x68e5No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:28.790851116 CET8.8.8.8192.168.2.140x7320No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:33.265832901 CET8.8.8.8192.168.2.140xae01No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:41.741380930 CET8.8.8.8192.168.2.140x231aNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:44.218206882 CET8.8.8.8192.168.2.140x1780No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:48.694453955 CET8.8.8.8192.168.2.140x8e6aNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:56.169245005 CET8.8.8.8192.168.2.140x418eNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:46:58.643924952 CET8.8.8.8192.168.2.140xb4cfNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:04.121455908 CET8.8.8.8192.168.2.140x60c3No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:10.592704058 CET8.8.8.8192.168.2.140x48b8No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:21.072074890 CET8.8.8.8192.168.2.140xe5f2No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:23.548245907 CET8.8.8.8192.168.2.140x2f7eNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:30.024058104 CET8.8.8.8192.168.2.140x385fNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:35.500417948 CET8.8.8.8192.168.2.140x932aNo error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:45.976305962 CET8.8.8.8192.168.2.140x801No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false
            Dec 2, 2023 19:47:54.455149889 CET8.8.8.8192.168.2.140x3ba7No error (0)botnet.shoprbx.com45.142.182.95A (IP address)IN (0x0001)false

            System Behavior

            Start time (UTC):18:45:53
            Start date (UTC):02/12/2023
            Path:/tmp/bot.x86_64.elf
            Arguments:/tmp/bot.x86_64.elf
            File size:139576 bytes
            MD5 hash:91cf7c980da45a97653904fe8da5334b

            Start time (UTC):18:45:53
            Start date (UTC):02/12/2023
            Path:/tmp/bot.x86_64.elf
            Arguments:-
            File size:139576 bytes
            MD5 hash:91cf7c980da45a97653904fe8da5334b

            Start time (UTC):18:45:53
            Start date (UTC):02/12/2023
            Path:/tmp/bot.x86_64.elf
            Arguments:-
            File size:139576 bytes
            MD5 hash:91cf7c980da45a97653904fe8da5334b