Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
KxTpfpJzPK.elf

Overview

General Information

Sample name:KxTpfpJzPK.elf
renamed because original name is a hash value
Original sample name:257ebdd052ebdf082f1b986174b20c73.elf
Analysis ID:1427646
MD5:257ebdd052ebdf082f1b986174b20c73
SHA1:a2c15071200c000bdb00aee13428974fbeb4a992
SHA256:9b13eba37e412903be23987a66f3a08de9f21acb18febf87eb4c71df4eae28f2
Tags:32armelfmirai
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Performs DNS queries to domains with low reputation
Queries the IP of a very long domain name
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427646
Start date and time:2024-04-17 23:04:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:KxTpfpJzPK.elf
renamed because original name is a hash value
Original Sample Name:257ebdd052ebdf082f1b986174b20c73.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/1@11/0
  • VT rate limit hit for: KxTpfpJzPK.elf
Command:/tmp/KxTpfpJzPK.elf
PID:5483
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • KxTpfpJzPK.elf (PID: 5483, Parent: 5406, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/KxTpfpJzPK.elf
  • dash New Fork (PID: 5500, Parent: 3633)
  • rm (PID: 5500, Parent: 3633, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.fBKTZpHhzr /tmp/tmp.UD7HFmTAD6 /tmp/tmp.j4pNbUEbNf
  • dash New Fork (PID: 5501, Parent: 3633)
  • cat (PID: 5501, Parent: 3633, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.fBKTZpHhzr
  • dash New Fork (PID: 5502, Parent: 3633)
  • head (PID: 5502, Parent: 3633, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5503, Parent: 3633)
  • tr (PID: 5503, Parent: 3633, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5504, Parent: 3633)
  • cut (PID: 5504, Parent: 3633, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5505, Parent: 3633)
  • cat (PID: 5505, Parent: 3633, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.fBKTZpHhzr
  • dash New Fork (PID: 5506, Parent: 3633)
  • head (PID: 5506, Parent: 3633, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5507, Parent: 3633)
  • tr (PID: 5507, Parent: 3633, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5508, Parent: 3633)
  • cut (PID: 5508, Parent: 3633, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5509, Parent: 3633)
  • rm (PID: 5509, Parent: 3633, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.fBKTZpHhzr /tmp/tmp.UD7HFmTAD6 /tmp/tmp.j4pNbUEbNf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
KxTpfpJzPK.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    KxTpfpJzPK.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xd04c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd060:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd074:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd088:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd09c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd0b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd0c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd0d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd0ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd100:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd114:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd128:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd13c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd150:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd164:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd178:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd18c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd1a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd1b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd1c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd1dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5483.1.00007fa010017000.00007fa010027000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5483.1.00007fa010017000.00007fa010027000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd04c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd060:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd074:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd088:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd09c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd0b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd0c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd0d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd0ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd100:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd114:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd128:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd13c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd150:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd164:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd178:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd18c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd1a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd1b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd1c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd1dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      Process Memory Space: KxTpfpJzPK.elf PID: 5483Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x11f8c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11fa0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11fb4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11fc8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11fdc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11ff0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12004:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12018:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1202c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12040:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12054:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12068:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1207c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12090:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x120a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x120b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x120cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x120e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x120f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12108:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1211c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: KxTpfpJzPK.elfAvira: detected
      Source: KxTpfpJzPK.elfReversingLabs: Detection: 42%
      Source: unknownHTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.14:37902 version: TLS 1.2

      Networking

      barindex
      Source: DNS query: kovey.mezo-api.xyz
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.y9 f>366a0PV!E(C,:j5RDhy9 f15OOPV!a0EA@@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.y9 f66a0PV!E(j5Dhy9 fjOOPV!a0EA&@@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.y9 fvj66a0PV!E(C:j]5~Dhy9 fOmOOPV!a0EA/@@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.y9 f66a0PV!E(]O9Q55+Dhy9 fJOOPV!a0EAF@@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.z9 f_66a0PV!E(9[5Dhz9 f1bJJPV!a0E<@@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.9 f66a0PV!E(:$C5s)d9 fOOPV!a0EAK@@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.9 fFs66a0PV!E(u995Cd9 ftOOPV!a0EAU@@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.9 f\66a0PV!E(:k5Dd9 fOOPV!a0EAZ@@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.9 f66a0PV!E(jl5d9 fCOOPV!a0EAn@@w
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.9 fpL66a0PV!E(f&:G5"2Bd9 f\OJJPV!a0E<eO@@uX
      Source: global trafficTCP traffic: 192.168.2.14:40928 -> 45.131.111.219:33966
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
      Source: unknownDNS traffic detected: queries for: kovey.mezo-api.xyz
      Source: unknownNetwork traffic detected: HTTP traffic on port 37902 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37902
      Source: unknownHTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.14:37902 version: TLS 1.2

      System Summary

      barindex
      Source: KxTpfpJzPK.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5483.1.00007fa010017000.00007fa010027000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: Process Memory Space: KxTpfpJzPK.elf PID: 5483, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: KxTpfpJzPK.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5483.1.00007fa010017000.00007fa010027000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: Process Memory Space: KxTpfpJzPK.elf PID: 5483, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: classification engineClassification label: mal84.troj.evad.linELF@0/1@11/0
      Source: /usr/bin/dash (PID: 5500)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.fBKTZpHhzr /tmp/tmp.UD7HFmTAD6 /tmp/tmp.j4pNbUEbNfJump to behavior
      Source: /usr/bin/dash (PID: 5509)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.fBKTZpHhzr /tmp/tmp.UD7HFmTAD6 /tmp/tmp.j4pNbUEbNfJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/KxTpfpJzPK.elf (PID: 5485)File: /tmp/KxTpfpJzPK.elfJump to behavior
      Source: /tmp/KxTpfpJzPK.elf (PID: 5483)Queries kernel information via 'uname': Jump to behavior
      Source: KxTpfpJzPK.elf, 5483.1.00007fff1cc95000.00007fff1ccb6000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/KxTpfpJzPK.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/KxTpfpJzPK.elf
      Source: KxTpfpJzPK.elf, 5483.1.000055c7d82ca000.000055c7d83f8000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
      Source: KxTpfpJzPK.elf, 5483.1.00007fff1cc95000.00007fff1ccb6000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.XxdFfM:E
      Source: KxTpfpJzPK.elf, 5483.1.000055c7d82ca000.000055c7d83f8000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
      Source: KxTpfpJzPK.elf, 5483.1.00007fff1cc95000.00007fff1ccb6000.rw-.sdmpBinary or memory string: /tmp/qemu-open.XxdFfM
      Source: KxTpfpJzPK.elf, 5483.1.00007fff1cc95000.00007fff1ccb6000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: KxTpfpJzPK.elf, type: SAMPLE
      Source: Yara matchFile source: 5483.1.00007fa010017000.00007fa010027000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: KxTpfpJzPK.elf, type: SAMPLE
      Source: Yara matchFile source: 5483.1.00007fa010017000.00007fa010027000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
      File Deletion
      OS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture12
      Application Layer Protocol
      Traffic DuplicationData Destruction
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      KxTpfpJzPK.elf42%ReversingLabsLinux.Trojan.Mirai
      KxTpfpJzPK.elf100%AviraEXP/ELF.Mirai.Z.A
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      kovey.mezo-api.xyz
      45.131.111.219
      truetrue
        unknown
        kovey.mezo-api.xyz.y9 f>366a0PV!E(C,:j5RDhy9 f15OOPV!a0EA@@
        unknown
        unknowntrue
          unknown
          kovey.mezo-api.xyz.y9 fvj66a0PV!E(C:j]5~Dhy9 fOmOOPV!a0EA/@@
          unknown
          unknowntrue
            low
            kovey.mezo-api.xyz.z9 f_66a0PV!E(9[5Dhz9 f1bJJPV!a0E<@@
            unknown
            unknowntrue
              unknown
              kovey.mezo-api.xyz.9 fFs66a0PV!E(u995Cd9 ftOOPV!a0EAU@@
              unknown
              unknowntrue
                unknown
                kovey.mezo-api.xyz.y9 f66a0PV!E(j5Dhy9 fjOOPV!a0EA&@@
                unknown
                unknowntrue
                  unknown
                  kovey.mezo-api.xyz.9 f66a0PV!E(jl5d9 fCOOPV!a0EAn@@w
                  unknown
                  unknowntrue
                    unknown
                    kovey.mezo-api.xyz.9 fpL66a0PV!E(f&:G5"2Bd9 f\OJJPV!a0E<eO@@uX
                    unknown
                    unknowntrue
                      unknown
                      kovey.mezo-api.xyz.y9 f66a0PV!E(]O9Q55+Dhy9 fJOOPV!a0EAF@@
                      unknown
                      unknowntrue
                        unknown
                        kovey.mezo-api.xyz.9 f\66a0PV!E(:k5Dd9 fOOPV!a0EAZ@@
                        unknown
                        unknowntrue
                          unknown
                          kovey.mezo-api.xyz.9 f66a0PV!E(:$C5s)d9 fOOPV!a0EAK@@
                          unknown
                          unknowntrue
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            54.171.230.55
                            unknownUnited States
                            16509AMAZON-02USfalse
                            45.131.111.219
                            kovey.mezo-api.xyzGermany
                            398373SERVERDESTROYERSUStrue
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            54.171.230.55MCKV8ZxDFs.elfGet hashmaliciousMiraiBrowse
                              n7h2Ze4ezf.elfGet hashmaliciousMiraiBrowse
                                IRtucjku4f.elfGet hashmaliciousMiraiBrowse
                                  0nfIIyGr0B.elfGet hashmaliciousMiraiBrowse
                                    IOBZiJI5W8.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      pKz76hY1YS.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        1b0uLqaErv.elfGet hashmaliciousMiraiBrowse
                                          DYQCCl3BLP.elfGet hashmaliciousGafgytBrowse
                                            tr6Pn4QsAr.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              45.131.111.219MhV593RNl7.elfGet hashmaliciousMiraiBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                kovey.mezo-api.xyzMhV593RNl7.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AMAZON-02UShttp://www.orioncarbons.com/Get hashmaliciousUnknownBrowse
                                                • 54.74.204.68
                                                https://eNewsletter.cityemployeesclub.com/t/r-l-tiutyult-uklhkkukdd-d/Get hashmaliciousUnknownBrowse
                                                • 54.183.0.47
                                                https://7r62.j7s61.com/GA08G4/#bWljaGFlbC5rZW5uZXR0QGdsb2JhbGZvdW5kcmllcy5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                • 108.156.152.4
                                                https://gem.godaddy.com/signups/activate/MS0tY1AvemVtNUJYZW1aRkZhVXV5em1LMGovQVFvanpXTEJkVTNMTmpjSEVzUGpjYU1MSEJvUk9zQ1hjNjUvSG0wYURPNmF0a0N4TWVpWTFLdFJacGZvLS1RLzlVbk90eVpkZEYzNE42LS1pcmlqMm9EaTRpY0xmR2h4RzF3QVVBPT0?signup=11093294Get hashmaliciousUnknownBrowse
                                                • 13.32.192.212
                                                https://templett.com/design/v2/demo/TidyLady19/183741#Get hashmaliciousUnknownBrowse
                                                • 3.163.95.5
                                                http://mitchellind.ubpages.com/mi-ind/Get hashmaliciousUnknownBrowse
                                                • 3.161.154.158
                                                https://kristie-mancell-s-school.teachable.com/p/centerforfamilylifeGet hashmaliciousUnknownBrowse
                                                • 3.161.188.10
                                                https://utk.5z193.com/UTK/#test@test.comGet hashmaliciousHTMLPhisherBrowse
                                                • 3.162.103.56
                                                UuD1zt2QpK.elfGet hashmaliciousMiraiBrowse
                                                • 108.137.198.137
                                                cx9Nvpe3Cs.elfGet hashmaliciousMiraiBrowse
                                                • 35.75.100.97
                                                SERVERDESTROYERSUSMhV593RNl7.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                lzTrp2wJQy.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                l0fPUtuT9M.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                dF300rMf4v.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                BmIMg4rjSV.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                u4j24e9rI6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                GgO1RWlUa3.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                beijD7cEZt.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                4qcinQ8H9m.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                UXh072n8In.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 45.131.111.159
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                fb4726d465c5f28b84cd6d14cedd13a7IRtucjku4f.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                I72po0MZQY.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                xu4uPf2rLF.elfGet hashmaliciousGafgytBrowse
                                                • 54.171.230.55
                                                DYQCCl3BLP.elfGet hashmaliciousGafgytBrowse
                                                • 54.171.230.55
                                                tr6Pn4QsAr.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 54.171.230.55
                                                QvzaVBRGMX.elfGet hashmaliciousUnknownBrowse
                                                • 54.171.230.55
                                                HfuP5Csj29.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                VkiGKeyI3L.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                TaNoeG7qKG.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                No context
                                                Process:/tmp/KxTpfpJzPK.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):30
                                                Entropy (8bit):4.256564762130954
                                                Encrypted:false
                                                SSDEEP:3:Tg8HD3oHJN:Tg8jKJN
                                                MD5:606B2D37FC7907448132064F74DFB5D8
                                                SHA1:1EAA6161F1190DA3E98C8BA94E33BBFA946468AE
                                                SHA-256:AA60A16385B122FEA25ECDB6D143FC7306B9D95167E0DFF745E7E16D0E78FF58
                                                SHA-512:FF393AABF6FAB351F116A7BFE54832F6E9E50C8E0D1CCD4CA7207F163854EF1CBA02D76F01E70CBEE90DD1AF641E33ECD477C2F4D96A46D14018779F34CDDD4F
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/KxTpfpJzPK.elf.nwlrbbmqbh
                                                File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                                Entropy (8bit):6.093681454492732
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:KxTpfpJzPK.elf
                                                File size:63'424 bytes
                                                MD5:257ebdd052ebdf082f1b986174b20c73
                                                SHA1:a2c15071200c000bdb00aee13428974fbeb4a992
                                                SHA256:9b13eba37e412903be23987a66f3a08de9f21acb18febf87eb4c71df4eae28f2
                                                SHA512:9da8363bb83c2612f2e669d0605494600f1da5a2317716248b418304d220ba394c0e620e5f5c60176f3b6aabcf0c4d8363ff5355c0d1320d3d85b2ab85de27a8
                                                SSDEEP:1536:cmJ/tB1bk6ZYrWVLxDrvOfoG9L92DY0d:3J/tB+yOflQ80
                                                TLSH:EE533A81F8825613C6C012BBFB6E428D3B2657E8D2DE3217DD226F21778AD1B0D67E51
                                                File Content Preview:.ELF...a..........(.........4...0.......4. ...(.....................<...<...............@...@...@.......x%..........Q.td..................................-...L."....3..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                                ELF header

                                                Class:ELF32
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:ARM
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:ARM - ABI
                                                ABI Version:0
                                                Entry Point Address:0x8190
                                                Flags:0x202
                                                ELF Header Size:52
                                                Program Header Offset:52
                                                Program Header Size:32
                                                Number of Program Headers:3
                                                Section Header Offset:63024
                                                Section Header Size:40
                                                Number of Section Headers:10
                                                Header String Table Index:9
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .initPROGBITS0x80940x940x180x00x6AX004
                                                .textPROGBITS0x80b00xb00xceac0x00x6AX0016
                                                .finiPROGBITS0x14f5c0xcf5c0x140x00x6AX004
                                                .rodataPROGBITS0x14f700xcf700x22cc0x00x2A004
                                                .ctorsPROGBITS0x1f2400xf2400x80x00x3WA004
                                                .dtorsPROGBITS0x1f2480xf2480x80x00x3WA004
                                                .dataPROGBITS0x1f2540xf2540x39c0x00x3WA004
                                                .bssNOBITS0x1f5f00xf5f00x21c80x00x3WA004
                                                .shstrtabSTRTAB0x00xf5f00x3e0x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x80000x80000xf23c0xf23c6.12750x5R E0x8000.init .text .fini .rodata
                                                LOAD0xf2400x1f2400x1f2400x3b00x25783.22390x6RW 0x8000.ctors .dtors .data .bss
                                                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 17, 2024 23:04:58.090672970 CEST4092833966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:04:58.295579910 CEST339664092845.131.111.219192.168.2.14
                                                Apr 17, 2024 23:04:58.298530102 CEST4092833966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:04:58.298974037 CEST4092833966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:04:58.503736019 CEST339664092845.131.111.219192.168.2.14
                                                Apr 17, 2024 23:04:58.504190922 CEST4092833966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:04:58.709006071 CEST339664092845.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:09.206449986 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.418344021 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.497539997 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.497595072 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.497628927 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.497663975 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.497699022 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.497734070 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.497821093 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.497934103 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.497934103 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.497934103 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.497934103 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.497934103 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.500292063 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.712065935 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.714178085 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.714589119 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.714899063 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.927253008 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.927314997 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:09.927516937 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.927516937 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:09.929759026 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:10.141736984 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:10.141804934 CEST4433790254.171.230.55192.168.2.14
                                                Apr 17, 2024 23:05:10.141827106 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:10.141860008 CEST37902443192.168.2.1454.171.230.55
                                                Apr 17, 2024 23:05:13.710803986 CEST339664092845.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:13.711033106 CEST4092833966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:18.617469072 CEST339664092845.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:18.618016005 CEST4092833966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:18.618217945 CEST4092833966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:19.221862078 CEST4092833966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:19.426362038 CEST339664092845.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:20.675676107 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:20.885761023 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:20.886487007 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:20.886487007 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:21.096363068 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:21.097016096 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:21.307147026 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:36.306591034 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:36.307121038 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:05:51.518888950 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:05:51.519474983 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:06:06.731162071 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:06:06.731687069 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:06:10.919107914 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:06:11.128591061 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:06:20.921880960 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:06:21.131742001 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:06:36.386740923 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:06:36.387192965 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:06:51.598836899 CEST339664093045.131.111.219192.168.2.14
                                                Apr 17, 2024 23:06:51.599312067 CEST4093033966192.168.2.1445.131.111.219
                                                Apr 17, 2024 23:07:01.874289036 CEST339664093045.131.111.219192.168.2.14
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 17, 2024 23:04:57.439697981 CEST5095253192.168.2.148.8.8.8
                                                Apr 17, 2024 23:04:57.563050985 CEST53509528.8.8.8192.168.2.14
                                                Apr 17, 2024 23:04:57.563776016 CEST5819453192.168.2.148.8.8.8
                                                Apr 17, 2024 23:04:57.668478012 CEST53581948.8.8.8192.168.2.14
                                                Apr 17, 2024 23:04:57.668977022 CEST4775453192.168.2.148.8.8.8
                                                Apr 17, 2024 23:04:57.773761988 CEST53477548.8.8.8192.168.2.14
                                                Apr 17, 2024 23:04:57.774250031 CEST5960553192.168.2.148.8.8.8
                                                Apr 17, 2024 23:04:57.879221916 CEST53596058.8.8.8192.168.2.14
                                                Apr 17, 2024 23:04:57.879951000 CEST3742953192.168.2.148.8.8.8
                                                Apr 17, 2024 23:04:57.984560013 CEST53374298.8.8.8192.168.2.14
                                                Apr 17, 2024 23:04:57.985162020 CEST4800353192.168.2.148.8.8.8
                                                Apr 17, 2024 23:04:58.090081930 CEST53480038.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:19.618804932 CEST4078953192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:19.724031925 CEST53407898.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:19.724632978 CEST4495453192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:19.829503059 CEST53449548.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:19.830068111 CEST4619753192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:19.935019970 CEST53461978.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:19.935595989 CEST5961453192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:20.040582895 CEST53596148.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:20.041393995 CEST3566053192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:20.146295071 CEST53356608.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:20.146928072 CEST4261153192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:20.251672983 CEST53426118.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:20.252188921 CEST3603353192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:20.357189894 CEST53360338.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:20.357578993 CEST3577553192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:20.462683916 CEST53357758.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:20.463601112 CEST5623053192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:20.569020987 CEST53562308.8.8.8192.168.2.14
                                                Apr 17, 2024 23:05:20.569922924 CEST4048253192.168.2.148.8.8.8
                                                Apr 17, 2024 23:05:20.674927950 CEST53404828.8.8.8192.168.2.14
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 17, 2024 23:04:57.439697981 CEST192.168.2.148.8.8.80x709dStandard query (0)kovey.mezo-api.xyzA (IP address)IN (0x0001)false
                                                Apr 17, 2024 23:04:57.563776016 CEST192.168.2.148.8.8.80x4468Standard query (0)kovey.mezo-api.xyz.y9 f>366a0PV!E(C,:j5RDhy9 f15OOPV!a0EA@@5262056false
                                                Apr 17, 2024 23:04:57.668977022 CEST192.168.2.148.8.8.80x4468Standard query (0)kovey.mezo-api.xyz.y9 f66a0PV!E(j5Dhy9 fjOOPV!a0EA&@@5262056false
                                                Apr 17, 2024 23:04:57.774250031 CEST192.168.2.148.8.8.80x4468Standard query (0)kovey.mezo-api.xyz.y9 fvj66a0PV!E(C:j]5~Dhy9 fOmOOPV!a0EA/@@5262056false
                                                Apr 17, 2024 23:04:57.879951000 CEST192.168.2.148.8.8.80x4468Standard query (0)kovey.mezo-api.xyz.y9 f66a0PV!E(]O9Q55+Dhy9 fJOOPV!a0EAF@@5262056false
                                                Apr 17, 2024 23:04:57.985162020 CEST192.168.2.148.8.8.80x4468Standard query (0)kovey.mezo-api.xyz.z9 f_66a0PV!E(9[5Dhz9 f1bJJPV!a0E<@@52611651false
                                                Apr 17, 2024 23:05:20.146928072 CEST192.168.2.148.8.8.80xdb64Standard query (0)kovey.mezo-api.xyz.9 f66a0PV!E(:$C5s)d9 fOOPV!a0EAK@@5262056false
                                                Apr 17, 2024 23:05:20.252188921 CEST192.168.2.148.8.8.80xdb64Standard query (0)kovey.mezo-api.xyz.9 fFs66a0PV!E(u995Cd9 ftOOPV!a0EAU@@5262056false
                                                Apr 17, 2024 23:05:20.357578993 CEST192.168.2.148.8.8.80xdb64Standard query (0)kovey.mezo-api.xyz.9 f\66a0PV!E(:k5Dd9 fOOPV!a0EAZ@@5262056false
                                                Apr 17, 2024 23:05:20.463601112 CEST192.168.2.148.8.8.80xdb64Standard query (0)kovey.mezo-api.xyz.9 f66a0PV!E(jl5d9 fCOOPV!a0EAn@@w5262056false
                                                Apr 17, 2024 23:05:20.569922924 CEST192.168.2.148.8.8.80xdb64Standard query (0)kovey.mezo-api.xyz.9 fpL66a0PV!E(f&:G5"2Bd9 f\OJJPV!a0E<eO@@uX52611651false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 17, 2024 23:04:57.563050985 CEST8.8.8.8192.168.2.140x709dNo error (0)kovey.mezo-api.xyz45.131.111.219A (IP address)IN (0x0001)false
                                                TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                Apr 17, 2024 23:05:09.497734070 CEST54.171.230.55443192.168.2.1437902CN=motd.ubuntu.com CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USThu Mar 07 10:27:55 CET 2024 Fri Sep 04 02:00:00 CEST 2020Wed Jun 05 11:27:54 CEST 2024 Mon Sep 15 18:00:00 CEST 2025771,4866-4867-4865-49196-49200-163-159-52393-52392-52394-49327-49325-49315-49311-49245-49249-49239-49235-49195-49199-162-158-49326-49324-49314-49310-49244-49248-49238-49234-49188-49192-107-106-49267-49271-196-195-49187-49191-103-64-49266-49270-190-189-49162-49172-57-56-136-135-49161-49171-51-50-69-68-157-49313-49309-49233-156-49312-49308-49232-61-192-60-186-53-132-47-65-255,0-11-10-35-22-23-13-43-45-51,29-23-30-25-24,0-1-2fb4726d465c5f28b84cd6d14cedd13a7
                                                CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025

                                                System Behavior

                                                Start time (UTC):21:04:56
                                                Start date (UTC):17/04/2024
                                                Path:/tmp/KxTpfpJzPK.elf
                                                Arguments:/tmp/KxTpfpJzPK.elf
                                                File size:4956856 bytes
                                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                Start time (UTC):21:04:56
                                                Start date (UTC):17/04/2024
                                                Path:/tmp/KxTpfpJzPK.elf
                                                Arguments:-
                                                File size:4956856 bytes
                                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.fBKTZpHhzr /tmp/tmp.UD7HFmTAD6 /tmp/tmp.j4pNbUEbNf
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/cat
                                                Arguments:cat /tmp/tmp.fBKTZpHhzr
                                                File size:43416 bytes
                                                MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/head
                                                Arguments:head -n 10
                                                File size:47480 bytes
                                                MD5 hash:fd96a67145172477dd57131396fc9608

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/tr
                                                Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                File size:51544 bytes
                                                MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/cut
                                                Arguments:cut -c -80
                                                File size:47480 bytes
                                                MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/cat
                                                Arguments:cat /tmp/tmp.fBKTZpHhzr
                                                File size:43416 bytes
                                                MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/head
                                                Arguments:head -n 10
                                                File size:47480 bytes
                                                MD5 hash:fd96a67145172477dd57131396fc9608

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/tr
                                                Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                File size:51544 bytes
                                                MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/cut
                                                Arguments:cut -c -80
                                                File size:47480 bytes
                                                MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):21:05:09
                                                Start date (UTC):17/04/2024
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.fBKTZpHhzr /tmp/tmp.UD7HFmTAD6 /tmp/tmp.j4pNbUEbNf
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b