Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
6pZSqZEAa2.elf

Overview

General Information

Sample name:6pZSqZEAa2.elf
renamed because original name is a hash value
Original sample name:d4054f34cd68bfdeaed597ebe9eb226b.elf
Analysis ID:1427651
MD5:d4054f34cd68bfdeaed597ebe9eb226b
SHA1:a5537bc9b2ffb0c1da02cd6db15ddeea2bf3b42b
SHA256:28139b1c3cb363b5d592878c641c5e0b3978239a0fab0106b780bd8b9250a2a2
Tags:32elfmiraimotorola
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Performs DNS queries to domains with low reputation
Queries the IP of a very long domain name
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427651
Start date and time:2024-04-17 23:09:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:6pZSqZEAa2.elf
renamed because original name is a hash value
Original Sample Name:d4054f34cd68bfdeaed597ebe9eb226b.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/1@11/0
  • VT rate limit hit for: 6pZSqZEAa2.elf
Command:/tmp/6pZSqZEAa2.elf
PID:5545
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • 6pZSqZEAa2.elf (PID: 5545, Parent: 5469, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/6pZSqZEAa2.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
6pZSqZEAa2.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    6pZSqZEAa2.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xd583:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd597:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd5ab:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd5bf:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd5d3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd5e7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd5fb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd60f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd623:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd637:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd64b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd65f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd673:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd687:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd69b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd6af:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd6c3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd6d7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd6eb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd6ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd713:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5545.1.00007efea8001000.00007efea8011000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5545.1.00007efea8001000.00007efea8011000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd583:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd597:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5ab:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5bf:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5d3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5e7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5fb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd60f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd623:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd637:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd64b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd65f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd673:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd687:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd69b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd6af:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd6c3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd6d7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd6eb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd6ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd713:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      Process Memory Space: 6pZSqZEAa2.elf PID: 5545Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x18ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1913:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1927:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x193b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x194f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1963:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1977:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x198b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x199f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x19b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x19c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x19db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x19ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a03:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a17:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a2b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a3f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a53:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a67:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a7b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a8f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 6pZSqZEAa2.elfAvira: detected
      Source: 6pZSqZEAa2.elfReversingLabs: Detection: 39%

      Networking

      barindex
      Source: DNS query: kovey.mezo-api.xyz
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.: f66a1PV!E(_j5u!}: fOOPV!a1EA
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.: fJ66a1PV!E(b9L5K}: fKOOPV!a1EA
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.: f66a1PV!E(C:j5}: fOOPV!a1EA
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.: fz66a1PV!E(j5kmQ}: f{OOPV!a1EA
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.: f-66a1PV!E(Oa:^54}: fNNPV!a1E@
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.; fi66a1PV!E(e95o%; fOOPV!a1EA.@@.aV5-%koveymezo-apixyzm; fU[66a1PV!E(:.5.%; fc]OOPV!a1EA@@bH5-%.kovey.mezo-api.xyz.; f66a1PV!E(z95%; fOOPV!a1EA.@@.=5-I%koveymezo-apixyzm; f66a1PV!E(89.5
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.; fU[66a1PV!E(:5V%; fc]OOPV!a1EA.@@.H5-%koveymezo-apixyzm; f66a1PV!E(z9.5.%; fO
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.; f66a1PV!E(z95%; fOOPV!a1EA.@@.=5-I%koveymezo-apixyzm; f66a1PV!E(89.5
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.; f66a1PV!E(895D%; f#OOPV!a1EA.@@.2x5-%koveymezo-apixyzm; f(66a1PV!E(mj.5.%; f)NNPV!a1E@@@b15,U\mezo-koveymezo-apixyz; f6
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.; f(66a1PV!E(mj5x%; f)NNPV!a1E@.@@.15,U\mezo-koveymezo-apixyz; f66a1PV!E(g:.5
      Source: global trafficTCP traffic: 192.168.2.15:39686 -> 45.131.111.219:33966
      Source: unknownDNS traffic detected: queries for: kovey.mezo-api.xyz

      System Summary

      barindex
      Source: 6pZSqZEAa2.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5545.1.00007efea8001000.00007efea8011000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: Process Memory Space: 6pZSqZEAa2.elf PID: 5545, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: 6pZSqZEAa2.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5545.1.00007efea8001000.00007efea8011000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: Process Memory Space: 6pZSqZEAa2.elf PID: 5545, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: classification engineClassification label: mal84.troj.evad.linELF@0/1@11/0

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/6pZSqZEAa2.elf (PID: 5547)File: /tmp/6pZSqZEAa2.elfJump to behavior
      Source: /tmp/6pZSqZEAa2.elf (PID: 5545)Queries kernel information via 'uname': Jump to behavior
      Source: 6pZSqZEAa2.elf, 5545.1.00007fff22786000.00007fff227a7000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
      Source: 6pZSqZEAa2.elf, 5545.1.00007fff22786000.00007fff227a7000.rw-.sdmpBinary or memory string: OV/tmp/qemu-open.5NmYtw\t
      Source: 6pZSqZEAa2.elf, 5545.1.00007fff22786000.00007fff227a7000.rw-.sdmpBinary or memory string: ~/qemu-open.XXXXX
      Source: 6pZSqZEAa2.elf, 5545.1.0000564fe8932000.0000564fe89b7000.rw-.sdmpBinary or memory string: OV!/etc/qemu-binfmt/m68k
      Source: 6pZSqZEAa2.elf, 5545.1.00007fff22786000.00007fff227a7000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
      Source: 6pZSqZEAa2.elf, 5545.1.00007fff22786000.00007fff227a7000.rw-.sdmpBinary or memory string: /tmp/qemu-open.5NmYtw
      Source: 6pZSqZEAa2.elf, 5545.1.0000564fe8932000.0000564fe89b7000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
      Source: 6pZSqZEAa2.elf, 5545.1.00007fff22786000.00007fff227a7000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/6pZSqZEAa2.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/6pZSqZEAa2.elf

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 6pZSqZEAa2.elf, type: SAMPLE
      Source: Yara matchFile source: 5545.1.00007efea8001000.00007efea8011000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 6pZSqZEAa2.elf, type: SAMPLE
      Source: Yara matchFile source: 5545.1.00007efea8001000.00007efea8011000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      File Deletion
      OS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      SourceDetectionScannerLabelLink
      6pZSqZEAa2.elf39%ReversingLabsLinux.Trojan.Mirai
      6pZSqZEAa2.elf100%AviraEXP/ELF.Mirai.Z.A
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      kovey.mezo-api.xyz
      45.131.111.219
      truetrue
        unknown
        kovey.mezo-api.xyz.: f66a1PV!E(_j5u!}: fOOPV!a1EA
        unknown
        unknowntrue
          unknown
          kovey.mezo-api.xyz.: fJ66a1PV!E(b9L5K}: fKOOPV!a1EA
          unknown
          unknowntrue
            unknown
            kovey.mezo-api.xyz.; fi66a1PV!E(e95o%; fOOPV!a1EA.@@.aV5-%koveymezo-apixyzm; fU[66a1PV!E(:.5.%; fc]OOPV!a1EA@@bH5-%.kovey.mezo-api.xyz.; f66a1PV!E(z95%; fOOPV!a1EA.@@.=5-I%koveymezo-apixyzm; f66a1PV!E(89.5
            unknown
            unknowntrue
              unknown
              kovey.mezo-api.xyz.: f-66a1PV!E(Oa:^54}: fNNPV!a1E@
              unknown
              unknowntrue
                unknown
                kovey.mezo-api.xyz.; f66a1PV!E(895D%; f#OOPV!a1EA.@@.2x5-%koveymezo-apixyzm; f(66a1PV!E(mj.5.%; f)NNPV!a1E@@@b15,U\mezo-koveymezo-apixyz; f6
                unknown
                unknowntrue
                  unknown
                  kovey.mezo-api.xyz.; fU[66a1PV!E(:5V%; fc]OOPV!a1EA.@@.H5-%koveymezo-apixyzm; f66a1PV!E(z9.5.%; fO
                  unknown
                  unknowntrue
                    unknown
                    kovey.mezo-api.xyz.; f66a1PV!E(z95%; fOOPV!a1EA.@@.=5-I%koveymezo-apixyzm; f66a1PV!E(89.5
                    unknown
                    unknowntrue
                      unknown
                      kovey.mezo-api.xyz.: f66a1PV!E(C:j5}: fOOPV!a1EA
                      unknown
                      unknowntrue
                        unknown
                        kovey.mezo-api.xyz.; f(66a1PV!E(mj5x%; f)NNPV!a1E@.@@.15,U\mezo-koveymezo-apixyz; f66a1PV!E(g:.5
                        unknown
                        unknowntrue
                          unknown
                          kovey.mezo-api.xyz.: fz66a1PV!E(j5kmQ}: f{OOPV!a1EA
                          unknown
                          unknowntrue
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            45.131.111.219
                            kovey.mezo-api.xyzGermany
                            398373SERVERDESTROYERSUStrue
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            45.131.111.219FwLad7Fxwv.elfGet hashmaliciousMiraiBrowse
                              LPXP6wFUyX.elfGet hashmaliciousMiraiBrowse
                                dvxuxG34sk.elfGet hashmaliciousMiraiBrowse
                                  aNeRrtorRm.elfGet hashmaliciousMiraiBrowse
                                    KxTpfpJzPK.elfGet hashmaliciousMiraiBrowse
                                      MhV593RNl7.elfGet hashmaliciousMiraiBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        kovey.mezo-api.xyzFwLad7Fxwv.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        dvxuxG34sk.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        aNeRrtorRm.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        MhV593RNl7.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        SERVERDESTROYERSUSFwLad7Fxwv.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        LPXP6wFUyX.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        dvxuxG34sk.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        aNeRrtorRm.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        KxTpfpJzPK.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        MhV593RNl7.elfGet hashmaliciousMiraiBrowse
                                        • 45.131.111.219
                                        lzTrp2wJQy.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        • 45.131.111.159
                                        l0fPUtuT9M.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        • 45.131.111.159
                                        dF300rMf4v.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        • 45.131.111.159
                                        BmIMg4rjSV.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        • 45.131.111.159
                                        No context
                                        No context
                                        Process:/tmp/6pZSqZEAa2.elf
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):30
                                        Entropy (8bit):4.348394345536403
                                        Encrypted:false
                                        SSDEEP:3:TgTcmhXV8HJN:TgTcmhIJN
                                        MD5:08D18AFBD28914B479A90AFCCB8152BB
                                        SHA1:748AB2C475BCFD3C4B0ABF502F32E475BA9C8D8C
                                        SHA-256:72AF8FAE5F1635E3455D6CBB3A79E4FB6E71510975012ECA2DC007E5F9819209
                                        SHA-512:3198DB2C17D8C6AC1403E4E9935893D37CE3849A8897AAE87E0FBD5224E77B36A5A0B079A4F4C63E200022F872E775D46CE19614BD0A7A7021074F0E2D3F8E7E
                                        Malicious:false
                                        Reputation:low
                                        Preview:/tmp/6pZSqZEAa2.elf.nwlrbbmqbh
                                        File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                        Entropy (8bit):6.2737930965081175
                                        TrID:
                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                        File name:6pZSqZEAa2.elf
                                        File size:64'216 bytes
                                        MD5:d4054f34cd68bfdeaed597ebe9eb226b
                                        SHA1:a5537bc9b2ffb0c1da02cd6db15ddeea2bf3b42b
                                        SHA256:28139b1c3cb363b5d592878c641c5e0b3978239a0fab0106b780bd8b9250a2a2
                                        SHA512:8f164fd02cc85147290a8199e9bd66828a669b1f7ae30dd4839cdde62f94c27e5cd5c04e5fa7ca09d54b0db098fcb5e53689b277873db99a04e2c2a6f6f1e329
                                        SSDEEP:1536:CHj/RpEawVW5f852EO/9Ll8eejXLd6jn5WC6:aj/RqW5um9B8tmn5WC6
                                        TLSH:52534B9AF901DE7CF80BD2BA44574D0DB970A3D142830B3523ABFEA76D721A51D22F85
                                        File Content Preview:.ELF.......................D...4...H.....4. ...(.......................V...V...... ........\...\...\......%P...... .dt.Q............................NV..a....da.....N^NuNV..J9....f>"y...t QJ.g.X.#....tN."y...t QJ.f.A.....J.g.Hy...XN.X.........N^NuNV..N^NuN

                                        ELF header

                                        Class:ELF32
                                        Data:2's complement, big endian
                                        Version:1 (current)
                                        Machine:MC68000
                                        Version Number:0x1
                                        Type:EXEC (Executable file)
                                        OS/ABI:UNIX - System V
                                        ABI Version:0
                                        Entry Point Address:0x80000144
                                        Flags:0x0
                                        ELF Header Size:52
                                        Program Header Offset:52
                                        Program Header Size:32
                                        Number of Program Headers:3
                                        Section Header Offset:63816
                                        Section Header Size:40
                                        Number of Section Headers:10
                                        Header String Table Index:9
                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                        NULL0x00x00x00x00x0000
                                        .initPROGBITS0x800000940x940x140x00x6AX002
                                        .textPROGBITS0x800000a80xa80xd3fe0x00x6AX004
                                        .finiPROGBITS0x8000d4a60xd4a60xe0x00x6AX002
                                        .rodataPROGBITS0x8000d4b40xd4b40x20a20x00x2A002
                                        .ctorsPROGBITS0x8001155c0xf55c0x80x00x3WA004
                                        .dtorsPROGBITS0x800115640xf5640x80x00x3WA004
                                        .dataPROGBITS0x800115700xf5700x3980x00x3WA004
                                        .bssNOBITS0x800119080xf9080x21a40x00x3WA004
                                        .shstrtabSTRTAB0x00xf9080x3e0x00x0001
                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                        LOAD0x00x800000000x800000000xf5560xf5566.31150x5R E0x2000.init .text .fini .rodata
                                        LOAD0xf55c0x8001155c0x8001155c0x3ac0x25503.37800x6RW 0x2000.ctors .dtors .data .bss
                                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 17, 2024 23:10:12.144203901 CEST3968633966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:12.354351044 CEST339663968645.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:12.354789019 CEST3968633966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:12.354923964 CEST3968633966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:12.565078974 CEST339663968645.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:12.565412998 CEST3968633966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:12.775397062 CEST339663968645.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:27.811460018 CEST339663968645.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:27.811883926 CEST3968633966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:43.023082972 CEST339663968645.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:43.023525000 CEST3968633966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:56.266856909 CEST339663968645.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:56.267952919 CEST3968633966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:56.477755070 CEST339663968645.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:58.315869093 CEST3968833966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:58.520334959 CEST339663968845.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:58.520504951 CEST3968833966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:58.520653009 CEST3968833966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:58.725053072 CEST339663968845.131.111.219192.168.2.15
                                        Apr 17, 2024 23:10:58.725229979 CEST3968833966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:10:58.932089090 CEST339663968845.131.111.219192.168.2.15
                                        Apr 17, 2024 23:11:13.930855989 CEST339663968845.131.111.219192.168.2.15
                                        Apr 17, 2024 23:11:13.931137085 CEST3968833966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:11:28.550288916 CEST3968833966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:11:28.754894972 CEST339663968845.131.111.219192.168.2.15
                                        Apr 17, 2024 23:11:38.559900999 CEST3968833966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:11:38.764302969 CEST339663968845.131.111.219192.168.2.15
                                        Apr 17, 2024 23:11:53.822854042 CEST339663968845.131.111.219192.168.2.15
                                        Apr 17, 2024 23:11:53.822978973 CEST3968833966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:11:54.402215004 CEST339663968845.131.111.219192.168.2.15
                                        Apr 17, 2024 23:11:56.462690115 CEST3969033966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:11:56.666512966 CEST339663969045.131.111.219192.168.2.15
                                        Apr 17, 2024 23:11:56.666969061 CEST3969033966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:11:56.666969061 CEST3969033966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:11:56.870660067 CEST339663969045.131.111.219192.168.2.15
                                        Apr 17, 2024 23:11:56.870874882 CEST3969033966192.168.2.1545.131.111.219
                                        Apr 17, 2024 23:11:57.075026035 CEST339663969045.131.111.219192.168.2.15
                                        Apr 17, 2024 23:12:12.080925941 CEST339663969045.131.111.219192.168.2.15
                                        Apr 17, 2024 23:12:12.081146955 CEST3969033966192.168.2.1545.131.111.219
                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 17, 2024 23:10:11.507832050 CEST4425753192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:11.617125034 CEST53442578.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:11.617594957 CEST4924153192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:11.722557068 CEST53492418.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:11.722872019 CEST5861053192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:11.827568054 CEST53586108.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:11.827826023 CEST3806053192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:11.932298899 CEST53380608.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:11.933274031 CEST4262253192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:12.038389921 CEST53426228.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:12.038703918 CEST5035253192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:12.143584013 CEST53503528.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:57.268985987 CEST4751553192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:57.373378992 CEST53475158.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:57.373637915 CEST5827453192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:57.477904081 CEST53582748.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:57.478096962 CEST3548853192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:57.582379103 CEST53354888.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:57.582598925 CEST4951553192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:57.686841011 CEST53495158.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:57.687046051 CEST3956053192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:57.791341066 CEST53395608.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:57.791557074 CEST4274653192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:57.896013975 CEST53427468.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:57.896230936 CEST4461153192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:58.000664949 CEST53446118.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:58.001070976 CEST4334853192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:58.105287075 CEST53433488.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:58.105598927 CEST4709553192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:58.210093021 CEST53470958.8.8.8192.168.2.15
                                        Apr 17, 2024 23:10:58.210516930 CEST4192353192.168.2.158.8.8.8
                                        Apr 17, 2024 23:10:58.315521002 CEST53419238.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:55.403283119 CEST4183953192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:55.507752895 CEST53418398.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:55.508369923 CEST3976653192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:55.613204956 CEST53397668.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:55.613730907 CEST4687353192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:55.718306065 CEST53468738.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:55.718739033 CEST3503653192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:55.823195934 CEST53350368.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:55.823586941 CEST5234453192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:55.927889109 CEST53523448.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:55.928159952 CEST5506453192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:56.041428089 CEST53550648.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:56.041831970 CEST4184153192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:56.146737099 CEST53418418.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:56.147021055 CEST5525853192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:56.251565933 CEST53552588.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:56.251924992 CEST4591053192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:56.356225014 CEST53459108.8.8.8192.168.2.15
                                        Apr 17, 2024 23:11:56.356714964 CEST4787753192.168.2.158.8.8.8
                                        Apr 17, 2024 23:11:56.462069035 CEST53478778.8.8.8192.168.2.15
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Apr 17, 2024 23:10:11.507832050 CEST192.168.2.158.8.8.80x8157Standard query (0)kovey.mezo-api.xyzA (IP address)IN (0x0001)false
                                        Apr 17, 2024 23:10:57.268985987 CEST192.168.2.158.8.8.80x7d0bStandard query (0)kovey.mezo-api.xyz.: f66a1PV!E(_j5u!}: fOOPV!a1EA1926464false
                                        Apr 17, 2024 23:10:57.373637915 CEST192.168.2.158.8.8.80x7d0bStandard query (0)kovey.mezo-api.xyz.: fJ66a1PV!E(b9L5K}: fKOOPV!a1EA2566464false
                                        Apr 17, 2024 23:10:57.478096962 CEST192.168.2.158.8.8.80x7d0bStandard query (0)kovey.mezo-api.xyz.: f66a1PV!E(C:j5}: fOOPV!a1EA2848064false
                                        Apr 17, 2024 23:10:57.582598925 CEST192.168.2.158.8.8.80x7d0bStandard query (0)kovey.mezo-api.xyz.: fz66a1PV!E(j5kmQ}: f{OOPV!a1EA3513664false
                                        Apr 17, 2024 23:10:57.687046051 CEST192.168.2.158.8.8.80x7d0bStandard query (0)kovey.mezo-api.xyz.: f-66a1PV!E(Oa:^54}: fNNPV!a1E@3897664false
                                        Apr 17, 2024 23:11:55.403283119 CEST192.168.2.158.8.8.80x25a7Standard query (0)kovey.mezo-api.xyz.; fi66a1PV!E(e95o%; fOOPV!a1EA.@@.aV5-%koveymezo-apixyzm; fU[66a1PV!E(:.5.%; fc]OOPV!a1EA@@bH5-%.kovey.mezo-api.xyz.; f66a1PV!E(z95%; fOOPV!a1EA.@@.=5-I%koveymezo-apixyzm; f66a1PV!E(89.52064836false
                                        Apr 17, 2024 23:11:55.508369923 CEST192.168.2.158.8.8.80x25a7Standard query (0)kovey.mezo-api.xyz.; fU[66a1PV!E(:5V%; fc]OOPV!a1EA.@@.H5-%koveymezo-apixyzm; f66a1PV!E(z9.5.%; fO020224false
                                        Apr 17, 2024 23:11:55.613730907 CEST192.168.2.158.8.8.80x25a7Standard query (0)kovey.mezo-api.xyz.; f66a1PV!E(z95%; fOOPV!a1EA.@@.=5-I%koveymezo-apixyzm; f66a1PV!E(89.52064836false
                                        Apr 17, 2024 23:11:55.718739033 CEST192.168.2.158.8.8.80x25a7Standard query (0)kovey.mezo-api.xyz.; f66a1PV!E(895D%; f#OOPV!a1EA.@@.2x5-%koveymezo-apixyzm; f(66a1PV!E(mj.5.%; f)NNPV!a1E@@@b15,U\mezo-koveymezo-apixyz; f6540false
                                        Apr 17, 2024 23:11:55.823586941 CEST192.168.2.158.8.8.80x25a7Standard query (0)kovey.mezo-api.xyz.; f(66a1PV!E(mj5x%; f)NNPV!a1E@.@@.15,U\mezo-koveymezo-apixyz; f66a1PV!E(g:.5523963836false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Apr 17, 2024 23:10:11.617125034 CEST8.8.8.8192.168.2.150x8157No error (0)kovey.mezo-api.xyz45.131.111.219A (IP address)IN (0x0001)false

                                        System Behavior

                                        Start time (UTC):21:10:11
                                        Start date (UTC):17/04/2024
                                        Path:/tmp/6pZSqZEAa2.elf
                                        Arguments:/tmp/6pZSqZEAa2.elf
                                        File size:4463432 bytes
                                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                        Start time (UTC):21:10:11
                                        Start date (UTC):17/04/2024
                                        Path:/tmp/6pZSqZEAa2.elf
                                        Arguments:-
                                        File size:4463432 bytes
                                        MD5 hash:cd177594338c77b895ae27c33f8f86cc