Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
9j7cNZuGBt.elf

Overview

General Information

Sample name:9j7cNZuGBt.elf
renamed because original name is a hash value
Original sample name:98d55377310fd5d430c800d59c97112a.elf
Analysis ID:1417488
MD5:98d55377310fd5d430c800d59c97112a
SHA1:ba5e5458f6af66f1d8b86d2166a83435bb74403b
SHA256:d246880f2ab4b4f69d56cf261b07689c22359618f2811ed83026b395a05f23ad
Tags:32elfintelmirai
Infos:

Detection

Mirai
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Mirai
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1417488
Start date and time:2024-03-29 12:59:51 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:9j7cNZuGBt.elf
renamed because original name is a hash value
Original Sample Name:98d55377310fd5d430c800d59c97112a.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@17/0
Command:/tmp/9j7cNZuGBt.elf
PID:5485
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
9j7cNZuGBt.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
    9j7cNZuGBt.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      9j7cNZuGBt.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x10704:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10718:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1072c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10740:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10754:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10768:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1077c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10790:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x107a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x107b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x107cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x107e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x107f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10808:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1081c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10830:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10844:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10858:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1086c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10880:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10894:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      9j7cNZuGBt.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x105e4:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      9j7cNZuGBt.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x4040:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      Click to see the 6 entries
      SourceRuleDescriptionAuthorStrings
      5485.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        5485.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5485.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x10704:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10718:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1072c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10740:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10754:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10768:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1077c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10790:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x107a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x107b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x107cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x107e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x107f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10808:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1081c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10830:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10844:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10858:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1086c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10880:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10894:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5485.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
          • 0x105e4:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
          5485.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
          • 0x4040:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
          Click to see the 9 entries
          Timestamp:03/29/24-13:02:42.928581
          SID:2030490
          Source Port:54218
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:59.128607
          SID:2030490
          Source Port:54206
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:02:00.762642
          SID:2030490
          Source Port:54208
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:37.590326
          SID:2030490
          Source Port:54198
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:02:38.294699
          SID:2030490
          Source Port:54216
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:33.953773
          SID:2030490
          Source Port:54196
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:00:47.693813
          SID:2030490
          Source Port:54186
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:13.691338
          SID:2030490
          Source Port:54192
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:02:11.393752
          SID:2030490
          Source Port:54210
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:42.227728
          SID:2030490
          Source Port:54200
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:02.965732
          SID:2030490
          Source Port:54190
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:23.325093
          SID:2030490
          Source Port:54194
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:02:18.024375
          SID:2030490
          Source Port:54212
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:02:28.660170
          SID:2030490
          Source Port:54214
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:43.861241
          SID:2030490
          Source Port:54202
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:01:50.495664
          SID:2030490
          Source Port:54204
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:03/29/24-13:00:54.331956
          SID:2030490
          Source Port:54188
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 9j7cNZuGBt.elfAvira: detected
          Source: 9j7cNZuGBt.elfVirustotal: Detection: 48%Perma Link
          Source: 9j7cNZuGBt.elfReversingLabs: Detection: 60%
          Source: 9j7cNZuGBt.elfJoe Sandbox ML: detected
          Source: 9j7cNZuGBt.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

          Networking

          barindex
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54186 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54188 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54190 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54192 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54194 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54196 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54198 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54200 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54202 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54204 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54206 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54208 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54210 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54212 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54214 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54216 -> 103.173.178.208:43957
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:54218 -> 103.173.178.208:43957
          Source: global trafficTCP traffic: 103.173.178.208 ports 43957,3,4,5,7,9
          Source: global trafficTCP traffic: 192.168.2.13:54186 -> 103.173.178.208:43957
          Source: unknownDNS traffic detected: queries for: ap.akdns.top

          System Summary

          barindex
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: Process Memory Space: 9j7cNZuGBt.elf PID: 5485, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: 9j7cNZuGBt.elf PID: 5485, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: Initial sampleString containing 'busybox' found: /bin/busybox
          Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 9j7cNZuGBt.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: Process Memory Space: 9j7cNZuGBt.elf PID: 5485, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: 9j7cNZuGBt.elf PID: 5485, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: classification engineClassification label: mal100.troj.linELF@0/0@17/0
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/238/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/239/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/3631/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/3095/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/241/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/1906/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/1482/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/1480/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/371/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/1238/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/134/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/3413/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/816/cmdlineJump to behavior
          Source: /tmp/9j7cNZuGBt.elf (PID: 5487)File opened: /proc/35/cmdlineJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 9j7cNZuGBt.elf, type: SAMPLE
          Source: Yara matchFile source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 9j7cNZuGBt.elf PID: 5485, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: Yara matchFile source: 9j7cNZuGBt.elf, type: SAMPLE
          Source: Yara matchFile source: 5485.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 9j7cNZuGBt.elf PID: 5485, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information1
          Scripting
          Valid AccountsWindows Management Instrumentation1
          Scripting
          Path InterceptionDirect Volume Access1
          OS Credential Dumping
          System Service DiscoveryRemote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          SourceDetectionScannerLabelLink
          9j7cNZuGBt.elf48%VirustotalBrowse
          9j7cNZuGBt.elf61%ReversingLabsLinux.Trojan.Mirai
          9j7cNZuGBt.elf100%AviraEXP/ELF.Mirai.Z.A
          9j7cNZuGBt.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          ap.akdns.top
          103.173.178.208
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            103.173.178.208
            ap.akdns.topunknown
            7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNetrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            103.173.178.2080FsVELdYxY.elfGet hashmaliciousMiraiBrowse
              2IS7hqlz6b.elfGet hashmaliciousMiraiBrowse
                vKJEMWrTHL.elfGet hashmaliciousMiraiBrowse
                  xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ap.akdns.top0FsVELdYxY.elfGet hashmaliciousMiraiBrowse
                    • 103.173.178.208
                    2IS7hqlz6b.elfGet hashmaliciousMiraiBrowse
                    • 103.173.178.208
                    vKJEMWrTHL.elfGet hashmaliciousMiraiBrowse
                    • 103.173.178.208
                    xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                    • 103.173.178.208
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    AARNET-AS-APAustralianAcademicandResearchNetworkAARNe0FsVELdYxY.elfGet hashmaliciousMiraiBrowse
                    • 103.173.178.208
                    2IS7hqlz6b.elfGet hashmaliciousMiraiBrowse
                    • 103.173.178.208
                    vKJEMWrTHL.elfGet hashmaliciousMiraiBrowse
                    • 103.173.178.208
                    xX2te0Hn5o.elfGet hashmaliciousMiraiBrowse
                    • 103.173.178.208
                    p8F35SRiO8.elfGet hashmaliciousMiraiBrowse
                    • 103.0.78.243
                    7JP4pajFXr.elfGet hashmaliciousMiraiBrowse
                    • 103.176.106.52
                    bot.arm7-20240327-1054.elfGet hashmaliciousMiraiBrowse
                    • 103.188.244.189
                    Whj7PiS4fK.elfGet hashmaliciousMirai, OkiruBrowse
                    • 144.205.100.69
                    F7u5JkRhpi.elfGet hashmaliciousMirai, OkiruBrowse
                    • 132.234.242.205
                    bot.arm7-20240327-0852.elfGet hashmaliciousMiraiBrowse
                    • 103.188.244.189
                    No context
                    No context
                    No created / dropped files found
                    File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                    Entropy (8bit):5.772282940599994
                    TrID:
                    • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                    • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                    File name:9j7cNZuGBt.elf
                    File size:93'768 bytes
                    MD5:98d55377310fd5d430c800d59c97112a
                    SHA1:ba5e5458f6af66f1d8b86d2166a83435bb74403b
                    SHA256:d246880f2ab4b4f69d56cf261b07689c22359618f2811ed83026b395a05f23ad
                    SHA512:fbc774d7e6115737ef413ba448927b2d85f4d1a39d34260a7eb1e9c15ac8862a7f7013b82b10fab305fd0444481dd5b8c2a897e5f2effbefacaa00a2dc2f1ef0
                    SSDEEP:1536:oFd1IRgCXUzx7t0fM6ltg0Eiyhcg6vnK72wPZnWhZS5xtY+z:oFdmR9XUzxh0fMQtg0Eimcn/Adew5bz
                    TLSH:CD936BC4F643E5F1EC8709B16137EB374B32F0BA111AEA43C7699972DCA2541DA06B9C
                    File Content Preview:.ELF....................d...4....l......4. ...(......................$...$...............$...........G..8...........Q.td............................U..S.......o4...h....c...[]...$.............U......=.....t..5....$......$.......u........t....h............

                    ELF header

                    Class:ELF32
                    Data:2's complement, little endian
                    Version:1 (current)
                    Machine:Intel 80386
                    Version Number:0x1
                    Type:EXEC (Executable file)
                    OS/ABI:UNIX - System V
                    ABI Version:0
                    Entry Point Address:0x8048164
                    Flags:0x0
                    ELF Header Size:52
                    Program Header Offset:52
                    Program Header Size:32
                    Number of Program Headers:3
                    Section Header Offset:93368
                    Section Header Size:40
                    Number of Section Headers:10
                    Header String Table Index:9
                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                    NULL0x00x00x00x00x0000
                    .initPROGBITS0x80480940x940x1c0x00x6AX001
                    .textPROGBITS0x80480b00xb00xfe860x00x6AX0016
                    .finiPROGBITS0x8057f360xff360x170x00x6AX001
                    .rodataPROGBITS0x8057f600xff600x25900x00x2A0032
                    .ctorsPROGBITS0x805b4f40x124f40xc0x00x3WA004
                    .dtorsPROGBITS0x805b5000x125000x80x00x3WA004
                    .dataPROGBITS0x805b5200x125200x47580x00x3WA0032
                    .bssNOBITS0x805fc800x16c780x49ac0x00x3WA0032
                    .shstrtabSTRTAB0x00x16c780x3e0x00x0001
                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                    LOAD0x00x80480000x80480000x124f00x124f06.60510x5R E0x1000.init .text .fini .rodata
                    LOAD0x124f40x805b4f40x805b4f40x47840x91380.36420x6RW 0x1000.ctors .dtors .data .bss
                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    03/29/24-13:02:42.928581TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5421843957192.168.2.13103.173.178.208
                    03/29/24-13:01:59.128607TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5420643957192.168.2.13103.173.178.208
                    03/29/24-13:02:00.762642TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5420843957192.168.2.13103.173.178.208
                    03/29/24-13:01:37.590326TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5419843957192.168.2.13103.173.178.208
                    03/29/24-13:02:38.294699TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5421643957192.168.2.13103.173.178.208
                    03/29/24-13:01:33.953773TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5419643957192.168.2.13103.173.178.208
                    03/29/24-13:00:47.693813TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5418643957192.168.2.13103.173.178.208
                    03/29/24-13:01:13.691338TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5419243957192.168.2.13103.173.178.208
                    03/29/24-13:02:11.393752TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5421043957192.168.2.13103.173.178.208
                    03/29/24-13:01:42.227728TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5420043957192.168.2.13103.173.178.208
                    03/29/24-13:01:02.965732TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5419043957192.168.2.13103.173.178.208
                    03/29/24-13:01:23.325093TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5419443957192.168.2.13103.173.178.208
                    03/29/24-13:02:18.024375TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5421243957192.168.2.13103.173.178.208
                    03/29/24-13:02:28.660170TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5421443957192.168.2.13103.173.178.208
                    03/29/24-13:01:43.861241TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5420243957192.168.2.13103.173.178.208
                    03/29/24-13:01:50.495664TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5420443957192.168.2.13103.173.178.208
                    03/29/24-13:00:54.331956TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5418843957192.168.2.13103.173.178.208
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 29, 2024 13:00:47.427862883 CET5418643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:00:47.693633080 CET4395754186103.173.178.208192.168.2.13
                    Mar 29, 2024 13:00:47.693737984 CET5418643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:00:47.693813086 CET5418643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:00:47.959430933 CET4395754186103.173.178.208192.168.2.13
                    Mar 29, 2024 13:00:47.959459066 CET4395754186103.173.178.208192.168.2.13
                    Mar 29, 2024 13:00:47.959537983 CET5418643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:00:48.224777937 CET4395754186103.173.178.208192.168.2.13
                    Mar 29, 2024 13:00:54.069936037 CET5418843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:00:54.331727982 CET4395754188103.173.178.208192.168.2.13
                    Mar 29, 2024 13:00:54.331955910 CET5418843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:00:54.331955910 CET5418843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:00:54.590013981 CET4395754188103.173.178.208192.168.2.13
                    Mar 29, 2024 13:00:54.590034962 CET4395754188103.173.178.208192.168.2.13
                    Mar 29, 2024 13:00:54.590275049 CET5418843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:00:54.848213911 CET4395754188103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:02.700233936 CET5419043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:02.965581894 CET4395754190103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:02.965698004 CET5419043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:02.965732098 CET5419043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:03.230947018 CET4395754190103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:03.231072903 CET4395754190103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:03.231241941 CET5419043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:03.496608019 CET4395754190103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:13.425492048 CET5419243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:13.691205978 CET4395754192103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:13.691303968 CET5419243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:13.691338062 CET5419243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:13.956594944 CET4395754192103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:13.956612110 CET4395754192103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:13.956701994 CET5419243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:14.221935987 CET4395754192103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:23.066814899 CET5419443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:23.324892044 CET4395754194103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:23.325092077 CET5419443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:23.325093031 CET5419443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:23.583411932 CET4395754194103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:23.583442926 CET4395754194103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:33.691930056 CET5419643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:33.953603029 CET4395754196103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:33.953742981 CET5419643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:33.953773022 CET5419643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:34.215437889 CET4395754196103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:34.215455055 CET4395754196103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:37.324980974 CET5419843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:37.590187073 CET4395754198103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:37.590296984 CET5419843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:37.590326071 CET5419843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:37.855602026 CET4395754198103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:37.855622053 CET4395754198103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:37.855720043 CET5419843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:38.121038914 CET4395754198103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:41.965913057 CET5420043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:42.227400064 CET4395754200103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:42.227689028 CET5420043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:42.227727890 CET5420043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:42.489537954 CET4395754200103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:42.489576101 CET4395754200103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:42.489715099 CET5420043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:42.751372099 CET4395754200103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:43.599138975 CET5420243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:43.860883951 CET4395754202103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:43.861191988 CET5420243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:43.861241102 CET5420243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:44.122792006 CET4395754202103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:44.122814894 CET4395754202103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:44.123078108 CET5420243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:44.384679079 CET4395754202103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:50.233597040 CET5420443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:50.495507956 CET4395754204103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:50.495615005 CET5420443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:50.495663881 CET5420443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:50.757920027 CET4395754204103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:50.757949114 CET4395754204103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:50.758038998 CET5420443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:51.019824982 CET4395754204103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:58.866736889 CET5420643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:59.128370047 CET4395754206103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:59.128572941 CET5420643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:59.128607035 CET5420643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:59.390311003 CET4395754206103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:59.390372038 CET4395754206103.173.178.208192.168.2.13
                    Mar 29, 2024 13:01:59.390464067 CET5420643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:01:59.652086973 CET4395754206103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:00.500689983 CET5420843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:00.762343884 CET4395754208103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:00.762639999 CET5420843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:00.762641907 CET5420843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:01.024166107 CET4395754208103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:01.024184942 CET4395754208103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:01.024329901 CET5420843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:01.286228895 CET4395754208103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:11.135482073 CET5421043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:11.393615961 CET4395754210103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:11.393716097 CET5421043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:11.393752098 CET5421043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:11.651705980 CET4395754210103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:11.651834011 CET4395754210103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:11.651993990 CET5421043957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:11.910114050 CET4395754210103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:17.762425900 CET5421243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:18.024178028 CET4395754212103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:18.024358988 CET5421243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:18.024374962 CET5421243957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:18.286253929 CET4395754212103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:18.286295891 CET4395754212103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:28.398361921 CET5421443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:28.660048008 CET4395754214103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:28.660131931 CET5421443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:28.660170078 CET5421443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:28.921926022 CET4395754214103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:28.921947002 CET4395754214103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:28.922039032 CET5421443957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:29.183645964 CET4395754214103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:38.032846928 CET5421643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:38.294483900 CET4395754216103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:38.294615030 CET5421643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:38.294698954 CET5421643957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:38.556586027 CET4395754216103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:38.556607962 CET4395754216103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:42.666682959 CET5421843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:42.928325891 CET4395754218103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:42.928448915 CET5421843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:42.928580999 CET5421843957192.168.2.13103.173.178.208
                    Mar 29, 2024 13:02:43.191258907 CET4395754218103.173.178.208192.168.2.13
                    Mar 29, 2024 13:02:43.191334009 CET4395754218103.173.178.208192.168.2.13
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 29, 2024 13:00:47.317327976 CET4739953192.168.2.138.8.8.8
                    Mar 29, 2024 13:00:47.427694082 CET53473998.8.8.8192.168.2.13
                    Mar 29, 2024 13:00:53.959881067 CET3976553192.168.2.138.8.8.8
                    Mar 29, 2024 13:00:54.069787979 CET53397658.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:02.590410948 CET4266253192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:02.700093985 CET53426628.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:13.231618881 CET4168953192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:13.425347090 CET53416898.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:22.957083941 CET3727153192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:23.066621065 CET53372718.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:33.583920956 CET5126553192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:33.691740036 CET53512658.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:37.215820074 CET3738853192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:37.324713945 CET53373888.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:41.855875969 CET4169653192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:41.965754986 CET53416968.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:43.489855051 CET4249353192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:43.598979950 CET53424938.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:50.123258114 CET5861653192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:50.233361006 CET53586168.8.8.8192.168.2.13
                    Mar 29, 2024 13:01:58.758253098 CET5952453192.168.2.138.8.8.8
                    Mar 29, 2024 13:01:58.866607904 CET53595248.8.8.8192.168.2.13
                    Mar 29, 2024 13:02:00.390639067 CET5040453192.168.2.138.8.8.8
                    Mar 29, 2024 13:02:00.500452995 CET53504048.8.8.8192.168.2.13
                    Mar 29, 2024 13:02:11.024647951 CET3612653192.168.2.138.8.8.8
                    Mar 29, 2024 13:02:11.135334015 CET53361268.8.8.8192.168.2.13
                    Mar 29, 2024 13:02:17.652189970 CET5724753192.168.2.138.8.8.8
                    Mar 29, 2024 13:02:17.762320995 CET53572478.8.8.8192.168.2.13
                    Mar 29, 2024 13:02:28.286551952 CET3434753192.168.2.138.8.8.8
                    Mar 29, 2024 13:02:28.398222923 CET53343478.8.8.8192.168.2.13
                    Mar 29, 2024 13:02:37.922220945 CET5734353192.168.2.138.8.8.8
                    Mar 29, 2024 13:02:38.032597065 CET53573438.8.8.8192.168.2.13
                    Mar 29, 2024 13:02:42.556991100 CET3689653192.168.2.138.8.8.8
                    Mar 29, 2024 13:02:42.666498899 CET53368968.8.8.8192.168.2.13
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Mar 29, 2024 13:00:47.317327976 CET192.168.2.138.8.8.80x404Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:00:53.959881067 CET192.168.2.138.8.8.80xe10dStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:02.590410948 CET192.168.2.138.8.8.80x28dcStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:13.231618881 CET192.168.2.138.8.8.80x5efStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:22.957083941 CET192.168.2.138.8.8.80x8c05Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:33.583920956 CET192.168.2.138.8.8.80xa377Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:37.215820074 CET192.168.2.138.8.8.80x87a3Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:41.855875969 CET192.168.2.138.8.8.80xa554Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:43.489855051 CET192.168.2.138.8.8.80x20aStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:50.123258114 CET192.168.2.138.8.8.80x3b60Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:58.758253098 CET192.168.2.138.8.8.80x8b3aStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:00.390639067 CET192.168.2.138.8.8.80xc530Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:11.024647951 CET192.168.2.138.8.8.80x15adStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:17.652189970 CET192.168.2.138.8.8.80xa0e3Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:28.286551952 CET192.168.2.138.8.8.80x946fStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:37.922220945 CET192.168.2.138.8.8.80x34ecStandard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:42.556991100 CET192.168.2.138.8.8.80x2323Standard query (0)ap.akdns.topA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Mar 29, 2024 13:00:47.427694082 CET8.8.8.8192.168.2.130x404No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:00:54.069787979 CET8.8.8.8192.168.2.130xe10dNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:02.700093985 CET8.8.8.8192.168.2.130x28dcNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:13.425347090 CET8.8.8.8192.168.2.130x5efNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:23.066621065 CET8.8.8.8192.168.2.130x8c05No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:33.691740036 CET8.8.8.8192.168.2.130xa377No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:37.324713945 CET8.8.8.8192.168.2.130x87a3No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:41.965754986 CET8.8.8.8192.168.2.130xa554No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:43.598979950 CET8.8.8.8192.168.2.130x20aNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:50.233361006 CET8.8.8.8192.168.2.130x3b60No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:01:58.866607904 CET8.8.8.8192.168.2.130x8b3aNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:00.500452995 CET8.8.8.8192.168.2.130xc530No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:11.135334015 CET8.8.8.8192.168.2.130x15adNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:17.762320995 CET8.8.8.8192.168.2.130xa0e3No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:28.398222923 CET8.8.8.8192.168.2.130x946fNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:38.032597065 CET8.8.8.8192.168.2.130x34ecNo error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false
                    Mar 29, 2024 13:02:42.666498899 CET8.8.8.8192.168.2.130x2323No error (0)ap.akdns.top103.173.178.208A (IP address)IN (0x0001)false

                    System Behavior

                    Start time (UTC):12:00:46
                    Start date (UTC):29/03/2024
                    Path:/tmp/9j7cNZuGBt.elf
                    Arguments:/tmp/9j7cNZuGBt.elf
                    File size:93768 bytes
                    MD5 hash:98d55377310fd5d430c800d59c97112a

                    Start time (UTC):12:00:46
                    Start date (UTC):29/03/2024
                    Path:/tmp/9j7cNZuGBt.elf
                    Arguments:-
                    File size:93768 bytes
                    MD5 hash:98d55377310fd5d430c800d59c97112a

                    Start time (UTC):12:00:46
                    Start date (UTC):29/03/2024
                    Path:/tmp/9j7cNZuGBt.elf
                    Arguments:-
                    File size:93768 bytes
                    MD5 hash:98d55377310fd5d430c800d59c97112a