Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
0FsVELdYxY.elf

Overview

General Information

Sample name:0FsVELdYxY.elf
renamed because original name is a hash value
Original sample name:9ac0b40bdad9ff4c6d88eef34aadf843.elf
Analysis ID:1417487
MD5:9ac0b40bdad9ff4c6d88eef34aadf843
SHA1:ffb2a0c6ee33a26a56a2d8ad151f5aa32eee1a76
SHA256:2b639421e0b119ec186175cc4bbe8a2a98d2f4ef7f9ecaf7670c4cc0197ae2e0
Tags:64elfmirai
Infos:

Detection

Mirai
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Mirai
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1417487
Start date and time:2024-03-29 12:58:50 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 21s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:0FsVELdYxY.elf
renamed because original name is a hash value
Original Sample Name:9ac0b40bdad9ff4c6d88eef34aadf843.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@11/0
Command:/tmp/0FsVELdYxY.elf
PID:6218
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
0FsVELdYxY.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
    0FsVELdYxY.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      0FsVELdYxY.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x17480:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17494:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x174a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x174bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x174d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x174e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x174f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1750c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17520:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17534:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17548:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1755c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17570:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17584:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17598:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x175ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x175c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x175d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x175e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x175fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17610:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      0FsVELdYxY.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0xd9e0:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      0FsVELdYxY.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0xe1af:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      Click to see the 13 entries
      SourceRuleDescriptionAuthorStrings
      6218.1.0000000000400000.000000000041b000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        6218.1.0000000000400000.000000000041b000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          6218.1.0000000000400000.000000000041b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x17480:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x17494:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x174a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x174bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x174d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x174e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x174f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1750c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x17520:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x17534:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x17548:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1755c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x17570:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x17584:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x17598:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x175ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x175c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x175d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x175e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x175fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x17610:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          6218.1.0000000000400000.000000000041b000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
          • 0xd9e0:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
          6218.1.0000000000400000.000000000041b000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
          • 0xe1af:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
          Click to see the 16 entries
          Timestamp:03/29/24-13:00:13.103114
          SID:2030490
          Source Port:37320
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-12:59:29.503207
          SID:2030490
          Source Port:37306
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-12:59:36.132497
          SID:2030490
          Source Port:37308
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-12:59:40.854763
          SID:2030490
          Source Port:37310
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-12:59:51.189621
          SID:2030490
          Source Port:37314
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:00:02.470403
          SID:2030490
          Source Port:37318
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:00:18.382354
          SID:2030490
          Source Port:37324
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:00:15.739097
          SID:2030490
          Source Port:37322
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:00:29.016249
          SID:2030490
          Source Port:37326
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-12:59:44.556386
          SID:2030490
          Source Port:37312
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-12:59:56.822001
          SID:2030490
          Source Port:37316
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:31.641161
          SID:2030489
          Source Port:43957
          Destination Port:37326
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0FsVELdYxY.elfAvira: detected
          Source: 0FsVELdYxY.elfReversingLabs: Detection: 52%
          Source: 0FsVELdYxY.elfVirustotal: Detection: 42%Perma Link
          Source: 0FsVELdYxY.elfJoe Sandbox ML: detected
          Source: 0FsVELdYxY.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

          Networking

          barindex
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37306 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37308 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37310 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37312 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37314 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37316 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37318 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37320 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37322 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37324 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:37326 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 103.173.178.208:43957 -> 192.168.2.23:37326
          Source: global trafficTCP traffic: 103.173.178.208 ports 43957,3,4,5,7,9
          Source: global trafficTCP traffic: 192.168.2.23:37306 -> 103.173.178.208:43957
          Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
          Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
          Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
          Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
          Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: unknownDNS traffic detected: queries for: ap.akdns.top
          Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

          System Summary

          barindex
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: Process Memory Space: 0FsVELdYxY.elf PID: 6218, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: 0FsVELdYxY.elf PID: 6218, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: Initial sampleString containing 'busybox' found: /bin/busybox
          Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: 0FsVELdYxY.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: Process Memory Space: 0FsVELdYxY.elf PID: 6218, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: 0FsVELdYxY.elf PID: 6218, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: classification engineClassification label: mal100.troj.linELF@0/0@11/0
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1582/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/3088/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1579/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1699/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1335/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1698/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1334/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1576/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/2302/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/910/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/912/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/2307/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/918/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1594/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1349/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1344/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1465/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1586/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1463/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/801/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1900/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/491/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1599/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1477/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/379/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1476/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/4502/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/2208/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/35/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1809/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/1494/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/260/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/261/cmdlineJump to behavior
          Source: /tmp/0FsVELdYxY.elf (PID: 6220)File opened: /proc/141/cmdlineJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0FsVELdYxY.elf, type: SAMPLE
          Source: Yara matchFile source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 0FsVELdYxY.elf PID: 6218, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: Yara matchFile source: 0FsVELdYxY.elf, type: SAMPLE
          Source: Yara matchFile source: 6218.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 0FsVELdYxY.elf PID: 6218, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information1
          Scripting
          Valid AccountsWindows Management Instrumentation1
          Scripting
          Path InterceptionDirect Volume Access1
          OS Credential Dumping
          System Service DiscoveryRemote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
          Application Layer Protocol
          Traffic DuplicationData Destruction
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          0FsVELdYxY.elf53%ReversingLabsLinux.Trojan.Mirai
          0FsVELdYxY.elf42%VirustotalBrowse
          0FsVELdYxY.elf100%AviraEXP/ELF.Mirai.Z.A
          0FsVELdYxY.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          ap.akdns.top
          103.173.178.208
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            103.173.178.208
            ap.akdns.topunknown
            7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNetrue
            109.202.202.202
            unknownSwitzerland
            13030INIT7CHfalse
            91.189.91.43
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            91.189.91.42
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            103.173.178.2082IS7hqlz6b.elfGet hashmaliciousMiraiBrowse
              vKJEMWrTHL.elfGet hashmaliciousMiraiBrowse
                xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                  109.202.202.202xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                    XIbeqhmmQI.elfGet hashmaliciousGafgyt, MiraiBrowse
                      XmztmwSit3.elfGet hashmaliciousUnknownBrowse
                        D2sLkFb0Il.elfGet hashmaliciousGafgyt, MiraiBrowse
                          ehDbsf5C6M.elfGet hashmaliciousGafgyt, MiraiBrowse
                            arm5.elfGet hashmaliciousMiraiBrowse
                              SecuriteInfo.com.Linux.BtcMine.791.1794.25936.elfGet hashmaliciousUnknownBrowse
                                cG90Z4Gln7.elfGet hashmaliciousMirai, GafgytBrowse
                                  xU378s6kE2.elfGet hashmaliciousMiraiBrowse
                                    91.189.91.43xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                                      XIbeqhmmQI.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        XmztmwSit3.elfGet hashmaliciousUnknownBrowse
                                          D2sLkFb0Il.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            ehDbsf5C6M.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              arm5.elfGet hashmaliciousMiraiBrowse
                                                SecuriteInfo.com.Linux.BtcMine.791.1794.25936.elfGet hashmaliciousUnknownBrowse
                                                  cG90Z4Gln7.elfGet hashmaliciousMirai, GafgytBrowse
                                                    xU378s6kE2.elfGet hashmaliciousMiraiBrowse
                                                      91.189.91.42xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                                                        XIbeqhmmQI.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          XmztmwSit3.elfGet hashmaliciousUnknownBrowse
                                                            D2sLkFb0Il.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                              ehDbsf5C6M.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                arm5.elfGet hashmaliciousMiraiBrowse
                                                                  SecuriteInfo.com.Linux.BtcMine.791.1794.25936.elfGet hashmaliciousUnknownBrowse
                                                                    cG90Z4Gln7.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      xU378s6kE2.elfGet hashmaliciousMiraiBrowse
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        ap.akdns.top2IS7hqlz6b.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.173.178.208
                                                                        vKJEMWrTHL.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.173.178.208
                                                                        xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.173.178.208
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        CANONICAL-ASGBvKJEMWrTHL.elfGet hashmaliciousMiraiBrowse
                                                                        • 185.125.190.26
                                                                        qQ6lZJdx7E.elfGet hashmaliciousMiraiBrowse
                                                                        • 185.125.190.26
                                                                        xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        XIbeqhmmQI.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 91.189.91.42
                                                                        XmztmwSit3.elfGet hashmaliciousUnknownBrowse
                                                                        • 91.189.91.42
                                                                        D2sLkFb0Il.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 91.189.91.42
                                                                        ehDbsf5C6M.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 91.189.91.42
                                                                        78mfG4QdNn.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 185.125.190.26
                                                                        mZFiaBnsij.elfGet hashmaliciousUnknownBrowse
                                                                        • 185.125.190.26
                                                                        CANONICAL-ASGBvKJEMWrTHL.elfGet hashmaliciousMiraiBrowse
                                                                        • 185.125.190.26
                                                                        qQ6lZJdx7E.elfGet hashmaliciousMiraiBrowse
                                                                        • 185.125.190.26
                                                                        xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        XIbeqhmmQI.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 91.189.91.42
                                                                        XmztmwSit3.elfGet hashmaliciousUnknownBrowse
                                                                        • 91.189.91.42
                                                                        D2sLkFb0Il.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 91.189.91.42
                                                                        ehDbsf5C6M.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 91.189.91.42
                                                                        78mfG4QdNn.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 185.125.190.26
                                                                        mZFiaBnsij.elfGet hashmaliciousUnknownBrowse
                                                                        • 185.125.190.26
                                                                        AARNET-AS-APAustralianAcademicandResearchNetworkAARNe2IS7hqlz6b.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.173.178.208
                                                                        vKJEMWrTHL.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.173.178.208
                                                                        xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.173.178.208
                                                                        p8F35SRiO8.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.0.78.243
                                                                        7JP4pajFXr.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.176.106.52
                                                                        bot.arm7-20240327-1054.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.188.244.189
                                                                        Whj7PiS4fK.elfGet hashmaliciousMirai, OkiruBrowse
                                                                        • 144.205.100.69
                                                                        F7u5JkRhpi.elfGet hashmaliciousMirai, OkiruBrowse
                                                                        • 132.234.242.205
                                                                        bot.arm7-20240327-0852.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.188.244.189
                                                                        bot.arm5-20240327-0852.elfGet hashmaliciousMiraiBrowse
                                                                        • 103.188.244.189
                                                                        INIT7CHxX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                                                                        • 109.202.202.202
                                                                        XIbeqhmmQI.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 109.202.202.202
                                                                        XmztmwSit3.elfGet hashmaliciousUnknownBrowse
                                                                        • 109.202.202.202
                                                                        D2sLkFb0Il.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 109.202.202.202
                                                                        ehDbsf5C6M.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                        • 109.202.202.202
                                                                        Mcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                                                                        • 213.144.142.24
                                                                        arm5.elfGet hashmaliciousMiraiBrowse
                                                                        • 109.202.202.202
                                                                        SecuriteInfo.com.Linux.BtcMine.791.1794.25936.elfGet hashmaliciousUnknownBrowse
                                                                        • 109.202.202.202
                                                                        cG90Z4Gln7.elfGet hashmaliciousMirai, GafgytBrowse
                                                                        • 109.202.202.202
                                                                        No context
                                                                        No context
                                                                        No created / dropped files found
                                                                        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                                                        Entropy (8bit):5.284804723087835
                                                                        TrID:
                                                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                        File name:0FsVELdYxY.elf
                                                                        File size:143'832 bytes
                                                                        MD5:9ac0b40bdad9ff4c6d88eef34aadf843
                                                                        SHA1:ffb2a0c6ee33a26a56a2d8ad151f5aa32eee1a76
                                                                        SHA256:2b639421e0b119ec186175cc4bbe8a2a98d2f4ef7f9ecaf7670c4cc0197ae2e0
                                                                        SHA512:6c5b681c6cacda83164fbe409929ddbac8732476929e00ac0261bf2fed2f8d5ee74bd177be3b71c40dd0b7ec24c472434d603755b24c7e3b3bd2296691a07d1c
                                                                        SSDEEP:3072:mTUTfCdO6FFtoqv68wKhc/t/ekNaogMewcgsK027uSOlU:mTUTfCdO6FFtoq4wwQdXU
                                                                        TLSH:78E34A07B4C184FDC4DAC1B44B9FF53AED32B0AD1238B16B27D4AA222E59E215F1DA54
                                                                        File Content Preview:.ELF..............>.......@.....@.......X/..........@.8...@.......................@.......@...............................................Q.......Q.....p.......................Q.td....................................................H...._....zk..H........

                                                                        ELF header

                                                                        Class:ELF64
                                                                        Data:2's complement, little endian
                                                                        Version:1 (current)
                                                                        Machine:Advanced Micro Devices X86-64
                                                                        Version Number:0x1
                                                                        Type:EXEC (Executable file)
                                                                        OS/ABI:UNIX - System V
                                                                        ABI Version:0
                                                                        Entry Point Address:0x400194
                                                                        Flags:0x0
                                                                        ELF Header Size:64
                                                                        Program Header Offset:64
                                                                        Program Header Size:56
                                                                        Number of Program Headers:3
                                                                        Section Header Offset:143192
                                                                        Section Header Size:64
                                                                        Number of Section Headers:10
                                                                        Header String Table Index:9
                                                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                        NULL0x00x00x00x00x0000
                                                                        .initPROGBITS0x4000e80xe80x130x00x6AX001
                                                                        .textPROGBITS0x4001000x1000x16ba60x00x6AX0016
                                                                        .finiPROGBITS0x416ca60x16ca60xe0x00x6AX001
                                                                        .rodataPROGBITS0x416cc00x16cc00x33e00x00x2A0032
                                                                        .ctorsPROGBITS0x51a0a80x1a0a80x180x00x3WA008
                                                                        .dtorsPROGBITS0x51a0c00x1a0c00x100x00x3WA008
                                                                        .dataPROGBITS0x51a0e00x1a0e00x8e380x00x3WA0032
                                                                        .bssNOBITS0x522f200x22f180x72a00x00x3WA0032
                                                                        .shstrtabSTRTAB0x00x22f180x3e0x00x0001
                                                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                        LOAD0x00x4000000x4000000x1a0a00x1a0a06.41940x5R E0x100000.init .text .fini .rodata
                                                                        LOAD0x1a0a80x51a0a80x51a0a80x8e700x101180.22800x6RW 0x100000.ctors .dtors .data .bss
                                                                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                        03/29/24-13:00:13.103114TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3732043957192.168.2.23103.173.178.208
                                                                        03/29/24-12:59:29.503207TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3730643957192.168.2.23103.173.178.208
                                                                        03/29/24-12:59:36.132497TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3730843957192.168.2.23103.173.178.208
                                                                        03/29/24-12:59:40.854763TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3731043957192.168.2.23103.173.178.208
                                                                        03/29/24-12:59:51.189621TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3731443957192.168.2.23103.173.178.208
                                                                        03/29/24-13:00:02.470403TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3731843957192.168.2.23103.173.178.208
                                                                        03/29/24-13:00:18.382354TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3732443957192.168.2.23103.173.178.208
                                                                        03/29/24-13:00:15.739097TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3732243957192.168.2.23103.173.178.208
                                                                        03/29/24-13:00:29.016249TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3732643957192.168.2.23103.173.178.208
                                                                        03/29/24-12:59:44.556386TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3731243957192.168.2.23103.173.178.208
                                                                        03/29/24-12:59:56.822001TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3731643957192.168.2.23103.173.178.208
                                                                        03/29/24-13:01:31.641161TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response4395737326103.173.178.208192.168.2.23
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Mar 29, 2024 12:59:28.222265959 CET3730643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:28.483800888 CET4395737306103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:28.483870029 CET3730643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:29.240995884 CET3730643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:29.503099918 CET4395737306103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:29.503206968 CET3730643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:29.503206968 CET3730643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:29.752937078 CET43928443192.168.2.2391.189.91.42
                                                                        Mar 29, 2024 12:59:29.764729023 CET4395737306103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:29.764857054 CET4395737306103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:29.764955997 CET3730643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:29.764956951 CET3730643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:30.520858049 CET3730643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:30.782469034 CET4395737306103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:35.128333092 CET42836443192.168.2.2391.189.91.43
                                                                        Mar 29, 2024 12:59:35.870531082 CET3730843957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:36.132288933 CET4395737308103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:36.132497072 CET3730843957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:36.132497072 CET3730843957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:36.394005060 CET4395737308103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:36.394026995 CET4395737308103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:36.394196987 CET3730843957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:36.655714989 CET4395737308103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:36.920010090 CET4251680192.168.2.23109.202.202.202
                                                                        Mar 29, 2024 12:59:40.592895985 CET3731043957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:40.854526043 CET4395737310103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:40.854763031 CET3731043957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:40.854763031 CET3731043957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:41.116369009 CET4395737310103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:41.116528034 CET4395737310103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:41.116729021 CET3731043957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:41.379031897 CET4395737310103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:44.289582968 CET3731243957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:44.556268930 CET4395737312103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:44.556359053 CET3731243957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:44.556385994 CET3731243957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:44.821739912 CET4395737312103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:44.821890116 CET4395737312103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:44.821976900 CET3731243957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:45.087143898 CET4395737312103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:49.718286037 CET43928443192.168.2.2391.189.91.42
                                                                        Mar 29, 2024 12:59:50.931426048 CET3731443957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:51.189418077 CET4395737314103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:51.189620972 CET3731443957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:51.189620972 CET3731443957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:51.447649956 CET4395737314103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:51.447727919 CET4395737314103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:51.447818995 CET3731443957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:51.705796957 CET4395737314103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:56.556534052 CET3731643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:56.821835995 CET4395737316103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:56.821959019 CET3731643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:56.822000980 CET3731643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:57.087131023 CET4395737316103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:57.087199926 CET4395737316103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 12:59:57.087587118 CET3731643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 12:59:57.352828979 CET4395737316103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:02.004659891 CET42836443192.168.2.2391.189.91.43
                                                                        Mar 29, 2024 13:00:02.197499990 CET3731843957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:02.470237017 CET4395737318103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:02.470359087 CET3731843957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:02.470402956 CET3731843957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:02.731947899 CET4395737318103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:02.732139111 CET4395737318103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:02.732255936 CET3731843957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:02.994200945 CET4395737318103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:08.147929907 CET4251680192.168.2.23109.202.202.202
                                                                        Mar 29, 2024 13:00:12.840928078 CET3732043957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:13.102938890 CET4395737320103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:13.103058100 CET3732043957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:13.103113890 CET3732043957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:13.364865065 CET4395737320103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:13.364931107 CET4395737320103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:15.473403931 CET3732243957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:15.738892078 CET4395737322103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:15.739053965 CET3732243957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:15.739097118 CET3732243957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:16.005321026 CET4395737322103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:16.005388975 CET4395737322103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:18.115009069 CET3732443957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:18.382181883 CET4395737324103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:18.382307053 CET3732443957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:18.382354021 CET3732443957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:18.648987055 CET4395737324103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:18.649048090 CET4395737324103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:18.649164915 CET3732443957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:18.914455891 CET4395737324103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:28.757900000 CET3732643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:29.016050100 CET4395737326103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:29.016247988 CET3732643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:29.016248941 CET3732643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:29.274291039 CET4395737326103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:29.276432991 CET4395737326103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:29.276504040 CET3732643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:30.672816038 CET43928443192.168.2.2391.189.91.42
                                                                        Mar 29, 2024 13:00:31.633510113 CET4395737326103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:31.633681059 CET3732643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:41.640347958 CET3732643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:00:41.898664951 CET4395737326103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:51.635787010 CET4395737326103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:00:51.635972977 CET3732643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:01:11.638593912 CET4395737326103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:01:11.638966084 CET3732643957192.168.2.23103.173.178.208
                                                                        Mar 29, 2024 13:01:31.641160965 CET4395737326103.173.178.208192.168.2.23
                                                                        Mar 29, 2024 13:01:31.641385078 CET3732643957192.168.2.23103.173.178.208
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Mar 29, 2024 12:59:28.112329006 CET4869653192.168.2.238.8.8.8
                                                                        Mar 29, 2024 12:59:28.222170115 CET53486968.8.8.8192.168.2.23
                                                                        Mar 29, 2024 12:59:35.764374971 CET3865953192.168.2.238.8.8.8
                                                                        Mar 29, 2024 12:59:35.870332956 CET53386598.8.8.8192.168.2.23
                                                                        Mar 29, 2024 12:59:40.393804073 CET3833953192.168.2.238.8.8.8
                                                                        Mar 29, 2024 12:59:40.592696905 CET53383398.8.8.8192.168.2.23
                                                                        Mar 29, 2024 12:59:44.116360903 CET6040753192.168.2.238.8.8.8
                                                                        Mar 29, 2024 12:59:44.289479971 CET53604078.8.8.8192.168.2.23
                                                                        Mar 29, 2024 12:59:50.821403980 CET5575453192.168.2.238.8.8.8
                                                                        Mar 29, 2024 12:59:50.931299925 CET53557548.8.8.8192.168.2.23
                                                                        Mar 29, 2024 12:59:56.447350979 CET5637853192.168.2.238.8.8.8
                                                                        Mar 29, 2024 12:59:56.556298018 CET53563788.8.8.8192.168.2.23
                                                                        Mar 29, 2024 13:00:02.087142944 CET5504753192.168.2.238.8.8.8
                                                                        Mar 29, 2024 13:00:02.197307110 CET53550478.8.8.8192.168.2.23
                                                                        Mar 29, 2024 13:00:12.731050014 CET5830753192.168.2.238.8.8.8
                                                                        Mar 29, 2024 13:00:12.840747118 CET53583078.8.8.8192.168.2.23
                                                                        Mar 29, 2024 13:00:15.364923954 CET3376953192.168.2.238.8.8.8
                                                                        Mar 29, 2024 13:00:15.473195076 CET53337698.8.8.8192.168.2.23
                                                                        Mar 29, 2024 13:00:18.005330086 CET5708953192.168.2.238.8.8.8
                                                                        Mar 29, 2024 13:00:18.114835978 CET53570898.8.8.8192.168.2.23
                                                                        Mar 29, 2024 13:00:28.647979021 CET4576853192.168.2.238.8.8.8
                                                                        Mar 29, 2024 13:00:28.757487059 CET53457688.8.8.8192.168.2.23
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Mar 29, 2024 12:59:28.112329006 CET192.168.2.238.8.8.80x2467Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:35.764374971 CET192.168.2.238.8.8.80xe46cStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:40.393804073 CET192.168.2.238.8.8.80xdd8fStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:44.116360903 CET192.168.2.238.8.8.80xabd4Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:50.821403980 CET192.168.2.238.8.8.80xb012Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:56.447350979 CET192.168.2.238.8.8.80x585bStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:02.087142944 CET192.168.2.238.8.8.80x7c68Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:12.731050014 CET192.168.2.238.8.8.80x1e4Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:15.364923954 CET192.168.2.238.8.8.80x8af0Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:18.005330086 CET192.168.2.238.8.8.80x8e7Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:28.647979021 CET192.168.2.238.8.8.80xfc13Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Mar 29, 2024 12:59:28.222170115 CET8.8.8.8192.168.2.230x2467No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:35.870332956 CET8.8.8.8192.168.2.230xe46cNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:40.592696905 CET8.8.8.8192.168.2.230xdd8fNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:44.289479971 CET8.8.8.8192.168.2.230xabd4No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:50.931299925 CET8.8.8.8192.168.2.230xb012No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 12:59:56.556298018 CET8.8.8.8192.168.2.230x585bNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:02.197307110 CET8.8.8.8192.168.2.230x7c68No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:12.840747118 CET8.8.8.8192.168.2.230x1e4No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:15.473195076 CET8.8.8.8192.168.2.230x8af0No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:18.114835978 CET8.8.8.8192.168.2.230x8e7No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                                                                        Mar 29, 2024 13:00:28.757487059 CET8.8.8.8192.168.2.230xfc13No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false

                                                                        System Behavior

                                                                        Start time (UTC):11:59:27
                                                                        Start date (UTC):29/03/2024
                                                                        Path:/tmp/0FsVELdYxY.elf
                                                                        Arguments:/tmp/0FsVELdYxY.elf
                                                                        File size:143832 bytes
                                                                        MD5 hash:9ac0b40bdad9ff4c6d88eef34aadf843

                                                                        Start time (UTC):11:59:27
                                                                        Start date (UTC):29/03/2024
                                                                        Path:/tmp/0FsVELdYxY.elf
                                                                        Arguments:-
                                                                        File size:143832 bytes
                                                                        MD5 hash:9ac0b40bdad9ff4c6d88eef34aadf843

                                                                        Start time (UTC):11:59:27
                                                                        Start date (UTC):29/03/2024
                                                                        Path:/tmp/0FsVELdYxY.elf
                                                                        Arguments:-
                                                                        File size:143832 bytes
                                                                        MD5 hash:9ac0b40bdad9ff4c6d88eef34aadf843