Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
YLjhvMJyOO.elf

Overview

General Information

Sample name:YLjhvMJyOO.elf
renamed because original name is a hash value
Original sample name:28b05f9283819c954ddaadd1105f7dab.elf
Analysis ID:1427664
MD5:28b05f9283819c954ddaadd1105f7dab
SHA1:f3ebcecb0ada3ff4ea311aae953e56fdac485683
SHA256:14b09fb51305b056b24300482dcca479ac19f36d6a5a519ba994c0ec692822d3
Tags:32armelfmirai
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Performs DNS queries to domains with low reputation
Queries the IP of a very long domain name
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427664
Start date and time:2024-04-17 23:21:28 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 38s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:YLjhvMJyOO.elf
renamed because original name is a hash value
Original Sample Name:28b05f9283819c954ddaadd1105f7dab.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/1@11/0
  • VT rate limit hit for: YLjhvMJyOO.elf
Command:/tmp/YLjhvMJyOO.elf
PID:5534
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • YLjhvMJyOO.elf (PID: 5534, Parent: 5451, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/YLjhvMJyOO.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
YLjhvMJyOO.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    YLjhvMJyOO.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xc44c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc49c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc500:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc514:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc528:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc53c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc550:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc564:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc578:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc58c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc5a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc5b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc5c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc5dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5534.1.00007fad58017000.00007fad58026000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5534.1.00007fad58017000.00007fad58026000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xc44c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc49c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc500:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc514:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc528:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc53c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc550:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc564:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc578:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc58c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc5a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc5b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc5c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc5dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      Process Memory Space: YLjhvMJyOO.elf PID: 5534Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x128f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12904:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12918:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1292c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12940:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12954:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12968:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1297c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12990:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x129a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x129b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x129cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x129e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x129f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12a08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12a1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12a30:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12a44:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12a58:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12a6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12a80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: YLjhvMJyOO.elfAvira: detected
      Source: YLjhvMJyOO.elfReversingLabs: Detection: 42%

      Networking

      barindex
      Source: DNS query: kovey.mezo-api.xyz
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= f66a1PV!E(j~5uG= fOOPV!a1EA;@@x
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= fvK66a1PV!E(%:5;= fMOOPV!a1EAP@@x
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= f66a1PV!E(j5`V= fOOPV!a1EAc@@x
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= f66a1PV!E(:#5I= fOOPV!a1EAe@@x
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= fk66a1PV!E(:,5 = fJJJPV!a1E<=@@h
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= fG/66a1PV!E(`mj5$= f1OOPV!a1EA@@t
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= f66a1PV!E(x:5;= fOOPV!a1EA@@t
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= ftc66a1PV!E(:5P= feOOPV!a1EA@@t
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= f66a1PV!E(je5!{= fNOOPV!a1EA*@@t
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.= fR66a1PV!E(|:1I5OL= fJJPV!a1E<Z@@5L
      Source: global trafficTCP traffic: 192.168.2.15:39686 -> 45.131.111.219:33966
      Source: unknownDNS traffic detected: queries for: kovey.mezo-api.xyz

      System Summary

      barindex
      Source: YLjhvMJyOO.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5534.1.00007fad58017000.00007fad58026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: Process Memory Space: YLjhvMJyOO.elf PID: 5534, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: YLjhvMJyOO.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5534.1.00007fad58017000.00007fad58026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: Process Memory Space: YLjhvMJyOO.elf PID: 5534, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: classification engineClassification label: mal84.troj.evad.linELF@0/1@11/0

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/YLjhvMJyOO.elf (PID: 5536)File: /tmp/YLjhvMJyOO.elfJump to behavior
      Source: /tmp/YLjhvMJyOO.elf (PID: 5534)Queries kernel information via 'uname': Jump to behavior
      Source: YLjhvMJyOO.elf, 5534.1.00007ffe35983000.00007ffe359a4000.rw-.sdmpBinary or memory string: /tmp/qemu-open.nrn8tC
      Source: YLjhvMJyOO.elf, 5534.1.00007ffe35983000.00007ffe359a4000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/YLjhvMJyOO.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/YLjhvMJyOO.elf
      Source: YLjhvMJyOO.elf, 5534.1.000055bd24f72000.000055bd250a0000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
      Source: YLjhvMJyOO.elf, 5534.1.00007ffe35983000.00007ffe359a4000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.nrn8tC:
      Source: YLjhvMJyOO.elf, 5534.1.000055bd24f72000.000055bd250a0000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
      Source: YLjhvMJyOO.elf, 5534.1.00007ffe35983000.00007ffe359a4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: YLjhvMJyOO.elf, type: SAMPLE
      Source: Yara matchFile source: 5534.1.00007fad58017000.00007fad58026000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: YLjhvMJyOO.elf, type: SAMPLE
      Source: Yara matchFile source: 5534.1.00007fad58017000.00007fad58026000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      File Deletion
      OS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      YLjhvMJyOO.elf42%ReversingLabsLinux.Trojan.Mirai
      YLjhvMJyOO.elf100%AviraEXP/ELF.Mirai.Z.A
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      kovey.mezo-api.xyz
      45.131.111.219
      truetrue
        unknown
        kovey.mezo-api.xyz.= fvK66a1PV!E(%:5;= fMOOPV!a1EAP@@x
        unknown
        unknowntrue
          unknown
          kovey.mezo-api.xyz.= f66a1PV!E(j5`V= fOOPV!a1EAc@@x
          unknown
          unknowntrue
            unknown
            kovey.mezo-api.xyz.= ftc66a1PV!E(:5P= feOOPV!a1EA@@t
            unknown
            unknowntrue
              unknown
              kovey.mezo-api.xyz.= fk66a1PV!E(:,5 = fJJJPV!a1E<=@@h
              unknown
              unknowntrue
                unknown
                kovey.mezo-api.xyz.= f66a1PV!E(:#5I= fOOPV!a1EAe@@x
                unknown
                unknowntrue
                  unknown
                  kovey.mezo-api.xyz.= fR66a1PV!E(|:1I5OL= fJJPV!a1E<Z@@5L
                  unknown
                  unknowntrue
                    unknown
                    kovey.mezo-api.xyz.= fG/66a1PV!E(`mj5$= f1OOPV!a1EA@@t
                    unknown
                    unknowntrue
                      low
                      kovey.mezo-api.xyz.= f66a1PV!E(je5!{= fNOOPV!a1EA*@@t
                      unknown
                      unknowntrue
                        unknown
                        kovey.mezo-api.xyz.= f66a1PV!E(j~5uG= fOOPV!a1EA;@@x
                        unknown
                        unknowntrue
                          unknown
                          kovey.mezo-api.xyz.= f66a1PV!E(x:5;= fOOPV!a1EA@@t
                          unknown
                          unknowntrue
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            45.131.111.219
                            kovey.mezo-api.xyzGermany
                            398373SERVERDESTROYERSUStrue
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            45.131.111.2198D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                              LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                                  RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                                    CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                                      Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                                        sMmzRMu1P6.elfGet hashmaliciousMiraiBrowse
                                          NvmCe2XrqN.elfGet hashmaliciousMiraiBrowse
                                            AkV7DALWTe.elfGet hashmaliciousMiraiBrowse
                                              6pZSqZEAa2.elfGet hashmaliciousMiraiBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                kovey.mezo-api.xyz8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                NvmCe2XrqN.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                SERVERDESTROYERSUS8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                sMmzRMu1P6.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                NvmCe2XrqN.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                AkV7DALWTe.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                6pZSqZEAa2.elfGet hashmaliciousMiraiBrowse
                                                • 45.131.111.219
                                                No context
                                                No context
                                                Process:/tmp/YLjhvMJyOO.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):30
                                                Entropy (8bit):4.415061012203069
                                                Encrypted:false
                                                SSDEEP:3:Tg5Eq1NR8HJN:TgaqfkJN
                                                MD5:E1E50B0E402B1310000B6E3B26910038
                                                SHA1:EF06C7D318180A7B7FEF2E385F6F8B7D58CFD256
                                                SHA-256:FE894D58ED4DB1715D58099064E297CC74A51F77E0370F4301869E79E6CF4656
                                                SHA-512:6C9CA632864150797A9198DB97CF075DAB3F22824F245B1819FD49BA6979AD58462807D905F591AD2BC5FE9C9ED97976FD891E0FBAA0E959336D7ED05B52815D
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/YLjhvMJyOO.elf.nwlrbbmqbh
                                                File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                                Entropy (8bit):6.074528867235396
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:YLjhvMJyOO.elf
                                                File size:60'352 bytes
                                                MD5:28b05f9283819c954ddaadd1105f7dab
                                                SHA1:f3ebcecb0ada3ff4ea311aae953e56fdac485683
                                                SHA256:14b09fb51305b056b24300482dcca479ac19f36d6a5a519ba994c0ec692822d3
                                                SHA512:bf495d228720e3c0f517a4b5a434c54000b6b1eb2ebb21945564c10e44b3a23294e406c6a27923d9fa84352c9de9583752de744d561da72c836f5063a6aae8ec
                                                SSDEEP:1536:W0KxqIhS6sggMUJzkIAiF8EsITRPZkxa:W0KxqI5XLk82TR68
                                                TLSH:15433991FC829623C5C412BBF66E468D3B3153E8E2DE72139E226F2177D681B0D67E41
                                                File Content Preview:.ELF...a..........(.........4...0.......4. ...(.....................<...<...............@...@...@.......x%..........Q.td..................................-...L."....0..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                                ELF header

                                                Class:ELF32
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:ARM
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:ARM - ABI
                                                ABI Version:0
                                                Entry Point Address:0x8190
                                                Flags:0x2
                                                ELF Header Size:52
                                                Program Header Offset:52
                                                Program Header Size:32
                                                Number of Program Headers:3
                                                Section Header Offset:59952
                                                Section Header Size:40
                                                Number of Section Headers:10
                                                Header String Table Index:9
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .initPROGBITS0x80940x940x180x00x6AX004
                                                .textPROGBITS0x80b00xb00xc2ac0x00x6AX0016
                                                .finiPROGBITS0x1435c0xc35c0x140x00x6AX004
                                                .rodataPROGBITS0x143700xc3700x22cc0x00x2A004
                                                .ctorsPROGBITS0x1e6400xe6400x80x00x3WA004
                                                .dtorsPROGBITS0x1e6480xe6480x80x00x3WA004
                                                .dataPROGBITS0x1e6540xe6540x39c0x00x3WA004
                                                .bssNOBITS0x1e9f00xe9f00x21c80x00x3WA004
                                                .shstrtabSTRTAB0x00xe9f00x3e0x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x80000x80000xe63c0xe63c6.11080x5R E0x8000.init .text .fini .rodata
                                                LOAD0xe6400x1e6400x1e6400x3b00x25783.22670x6RW 0x8000.ctors .dtors .data .bss
                                                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 17, 2024 23:22:14.728137970 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:22:14.938025951 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:22:14.938256979 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:22:14.938458920 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:22:15.148057938 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:22:15.148382902 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:22:15.358124018 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:22:30.358925104 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:22:30.359143019 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:22:45.599070072 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:22:45.599282980 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:00.811178923 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:23:00.811592102 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:16.062988997 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:23:16.063404083 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:25.000941038 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:25.210727930 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:23:35.010701895 CEST3968633966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:35.220602036 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:23:45.771502018 CEST339663968645.131.111.219192.168.2.15
                                                Apr 17, 2024 23:23:47.826139927 CEST3968833966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:48.030615091 CEST339663968845.131.111.219192.168.2.15
                                                Apr 17, 2024 23:23:48.030966997 CEST3968833966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:48.031275034 CEST3968833966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:48.235666990 CEST339663968845.131.111.219192.168.2.15
                                                Apr 17, 2024 23:23:48.235847950 CEST3968833966192.168.2.1545.131.111.219
                                                Apr 17, 2024 23:23:48.439994097 CEST339663968845.131.111.219192.168.2.15
                                                Apr 17, 2024 23:24:03.442425013 CEST339663968845.131.111.219192.168.2.15
                                                Apr 17, 2024 23:24:03.442709923 CEST3968833966192.168.2.1545.131.111.219
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 17, 2024 23:22:14.074229956 CEST3466653192.168.2.158.8.8.8
                                                Apr 17, 2024 23:22:14.201703072 CEST53346668.8.8.8192.168.2.15
                                                Apr 17, 2024 23:22:14.202260971 CEST3672553192.168.2.158.8.8.8
                                                Apr 17, 2024 23:22:14.306860924 CEST53367258.8.8.8192.168.2.15
                                                Apr 17, 2024 23:22:14.307415962 CEST3981153192.168.2.158.8.8.8
                                                Apr 17, 2024 23:22:14.412533998 CEST53398118.8.8.8192.168.2.15
                                                Apr 17, 2024 23:22:14.413130999 CEST3286453192.168.2.158.8.8.8
                                                Apr 17, 2024 23:22:14.517816067 CEST53328648.8.8.8192.168.2.15
                                                Apr 17, 2024 23:22:14.518085957 CEST5957953192.168.2.158.8.8.8
                                                Apr 17, 2024 23:22:14.622503996 CEST53595798.8.8.8192.168.2.15
                                                Apr 17, 2024 23:22:14.623056889 CEST4682153192.168.2.158.8.8.8
                                                Apr 17, 2024 23:22:14.727658987 CEST53468218.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:46.773539066 CEST4135953192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:46.878556013 CEST53413598.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:46.879128933 CEST4601553192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:46.983649015 CEST53460158.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:46.984266996 CEST5851753192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:47.088876009 CEST53585178.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:47.089478970 CEST3461653192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:47.194192886 CEST53346168.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:47.194752932 CEST3891453192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:47.299541950 CEST53389148.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:47.300241947 CEST5942853192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:47.405318975 CEST53594288.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:47.405986071 CEST4248453192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:47.510409117 CEST53424848.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:47.510890961 CEST3710853192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:47.615283966 CEST53371088.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:47.615926027 CEST4903953192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:47.720359087 CEST53490398.8.8.8192.168.2.15
                                                Apr 17, 2024 23:23:47.720973969 CEST3796753192.168.2.158.8.8.8
                                                Apr 17, 2024 23:23:47.825426102 CEST53379678.8.8.8192.168.2.15
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 17, 2024 23:22:14.074229956 CEST192.168.2.158.8.8.80x2114Standard query (0)kovey.mezo-api.xyzA (IP address)IN (0x0001)false
                                                Apr 17, 2024 23:22:14.202260971 CEST192.168.2.158.8.8.80xd4c2Standard query (0)kovey.mezo-api.xyz.= f66a1PV!E(j~5uG= fOOPV!a1EA;@@x5272056false
                                                Apr 17, 2024 23:22:14.307415962 CEST192.168.2.158.8.8.80xd4c2Standard query (0)kovey.mezo-api.xyz.= fvK66a1PV!E(%:5;= fMOOPV!a1EAP@@x5272056false
                                                Apr 17, 2024 23:22:14.413130999 CEST192.168.2.158.8.8.80xd4c2Standard query (0)kovey.mezo-api.xyz.= f66a1PV!E(j5`V= fOOPV!a1EAc@@x5272056false
                                                Apr 17, 2024 23:22:14.518085957 CEST192.168.2.158.8.8.80xd4c2Standard query (0)kovey.mezo-api.xyz.= f66a1PV!E(:#5I= fOOPV!a1EAe@@x5272056false
                                                Apr 17, 2024 23:22:14.623056889 CEST192.168.2.158.8.8.80xd4c2Standard query (0)kovey.mezo-api.xyz.= fk66a1PV!E(:,5 = fJJJPV!a1E<=@@h52711651false
                                                Apr 17, 2024 23:23:47.300241947 CEST192.168.2.158.8.8.80xcabdStandard query (0)kovey.mezo-api.xyz.= fG/66a1PV!E(`mj5$= f1OOPV!a1EA@@t5272056false
                                                Apr 17, 2024 23:23:47.405986071 CEST192.168.2.158.8.8.80xcabdStandard query (0)kovey.mezo-api.xyz.= f66a1PV!E(x:5;= fOOPV!a1EA@@t5272056false
                                                Apr 17, 2024 23:23:47.510890961 CEST192.168.2.158.8.8.80xcabdStandard query (0)kovey.mezo-api.xyz.= ftc66a1PV!E(:5P= feOOPV!a1EA@@t5272056false
                                                Apr 17, 2024 23:23:47.615926027 CEST192.168.2.158.8.8.80xcabdStandard query (0)kovey.mezo-api.xyz.= f66a1PV!E(je5!{= fNOOPV!a1EA*@@t5272056false
                                                Apr 17, 2024 23:23:47.720973969 CEST192.168.2.158.8.8.80xcabdStandard query (0)kovey.mezo-api.xyz.= fR66a1PV!E(|:1I5OL= fJJPV!a1E<Z@@5L52711651false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 17, 2024 23:22:14.201703072 CEST8.8.8.8192.168.2.150x2114No error (0)kovey.mezo-api.xyz45.131.111.219A (IP address)IN (0x0001)false

                                                System Behavior

                                                Start time (UTC):21:22:12
                                                Start date (UTC):17/04/2024
                                                Path:/tmp/YLjhvMJyOO.elf
                                                Arguments:/tmp/YLjhvMJyOO.elf
                                                File size:4956856 bytes
                                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                Start time (UTC):21:22:13
                                                Start date (UTC):17/04/2024
                                                Path:/tmp/YLjhvMJyOO.elf
                                                Arguments:-
                                                File size:4956856 bytes
                                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1