Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ClPVG70TmC.elf

Overview

General Information

Sample name:ClPVG70TmC.elf
renamed because original name is a hash value
Original sample name:25a8e0bc115a9b1ba4d74452f93bb857.elf
Analysis ID:1427666
MD5:25a8e0bc115a9b1ba4d74452f93bb857
SHA1:a0adc732551954f9c763b2c91c5c0d8d16e1af2e
SHA256:2ea2936a42d2190ba30887cac3878f3ed3070cd773e42ca778e3d1350c4e1f6f
Tags:64elfmirai
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427666
Start date and time:2024-04-17 23:24:14 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ClPVG70TmC.elf
renamed because original name is a hash value
Original Sample Name:25a8e0bc115a9b1ba4d74452f93bb857.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@4/0
  • VT rate limit hit for: ClPVG70TmC.elf
Command:/tmp/ClPVG70TmC.elf
PID:5436
Exit Code:
Exit Code Info:
Killed:True
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • ClPVG70TmC.elf (PID: 5436, Parent: 5349, MD5: 25a8e0bc115a9b1ba4d74452f93bb857) Arguments: /tmp/ClPVG70TmC.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
ClPVG70TmC.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    ClPVG70TmC.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xc720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc748:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc75c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc770:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc784:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc798:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc7ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc7c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc7d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc7e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc7fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc810:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc824:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc838:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc84c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc860:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc89c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc8b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    ClPVG70TmC.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
    • 0x94ac:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
    ClPVG70TmC.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
    • 0x9c9b:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
    ClPVG70TmC.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
    • 0x774e:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    • 0xb3f4:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    Click to see the 7 entries
    SourceRuleDescriptionAuthorStrings
    5436.1.0000000000400000.0000000000410000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5436.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xc720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc748:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc75c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc770:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc784:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc798:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc7ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc7c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc7d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc7e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc7fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc810:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc824:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc838:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc84c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc860:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc89c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc8b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5436.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0x94ac:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      5436.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0x9c9b:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      5436.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
      • 0x774e:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
      • 0xb3f4:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
      Click to see the 8 entries
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: ClPVG70TmC.elfAvira: detected
      Source: ClPVG70TmC.elfReversingLabs: Detection: 47%
      Source: ClPVG70TmC.elfJoe Sandbox ML: detected

      Networking

      barindex
      Source: DNS query: kovey.mezo-api.xyz
      Source: DNS query: kovey.mezo-api.xyz
      Source: global trafficTCP traffic: 192.168.2.13:44672 -> 45.131.111.219:33966
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownDNS traffic detected: queries for: kovey.mezo-api.xyz

      System Summary

      barindex
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_449937aa Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_449937aa Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
      Source: Process Memory Space: ClPVG70TmC.elf PID: 5436, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_449937aa reference_sample = 6f27766534445cffb097c7c52db1fca53b2210c1b10b75594f77c34dc8b994fe, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = cf2c6b86830099f039b41aeaafbffedfb8294a1124c499e99a11f48a06cd1dfd, id = 449937aa-682a-4906-89ab-80d7127e461e, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
      Source: ClPVG70TmC.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_449937aa reference_sample = 6f27766534445cffb097c7c52db1fca53b2210c1b10b75594f77c34dc8b994fe, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = cf2c6b86830099f039b41aeaafbffedfb8294a1124c499e99a11f48a06cd1dfd, id = 449937aa-682a-4906-89ab-80d7127e461e, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
      Source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
      Source: Process Memory Space: ClPVG70TmC.elf PID: 5436, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@4/0

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/ClPVG70TmC.elf (PID: 5436)File: /tmp/ClPVG70TmC.elfJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: ClPVG70TmC.elf, type: SAMPLE
      Source: Yara matchFile source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: ClPVG70TmC.elf, type: SAMPLE
      Source: Yara matchFile source: 5436.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      File Deletion
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      SourceDetectionScannerLabelLink
      ClPVG70TmC.elf47%ReversingLabsLinux.Trojan.Mirai
      ClPVG70TmC.elf100%AviraEXP/ELF.Mirai.Z.A
      ClPVG70TmC.elf100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      daisy.ubuntu.com
      162.213.35.25
      truefalse
        high
        kovey.mezo-api.xyz
        45.131.111.219
        truetrue
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          45.131.111.219
          kovey.mezo-api.xyzGermany
          398373SERVERDESTROYERSUStrue
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          45.131.111.219EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
            epLN92K8RM.elfGet hashmaliciousMiraiBrowse
              YLjhvMJyOO.elfGet hashmaliciousMiraiBrowse
                8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                  LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                    Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                      RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                        CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                          Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                            sMmzRMu1P6.elfGet hashmaliciousMiraiBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              kovey.mezo-api.xyz8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              daisy.ubuntu.com5VaGSbWdTq.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              n3l6rOHrCy.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.25
                              Ag0lD8sQ2M.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              64ZOedXgZ1.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              ZNmO15OLbB.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.25
                              p83YQKCH5M.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              YHbakNEfOJ.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 162.213.35.24
                              8hQCf2Y8Ra.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 162.213.35.24
                              MP364bXXBM.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.25
                              tKoNPvwS4w.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 162.213.35.24
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SERVERDESTROYERSUSEOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              YLjhvMJyOO.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              sMmzRMu1P6.elfGet hashmaliciousMiraiBrowse
                              • 45.131.111.219
                              No context
                              No context
                              No created / dropped files found
                              File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                              Entropy (8bit):6.106857063899895
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:ClPVG70TmC.elf
                              File size:67'456 bytes
                              MD5:25a8e0bc115a9b1ba4d74452f93bb857
                              SHA1:a0adc732551954f9c763b2c91c5c0d8d16e1af2e
                              SHA256:2ea2936a42d2190ba30887cac3878f3ed3070cd773e42ca778e3d1350c4e1f6f
                              SHA512:a5b1561f74cf9ff92820f866a5c23e667ae76058f178d45cc0fc2d47bb869114a6304675f363503bb0e4d3edd003aceba66381b7aca285122a0626eca9d6ce20
                              SSDEEP:1536:/1wuRt0n27SAqOjONWQ8WEUK1N6t4Ev0ZzgrtHe5QXt4dD:NwuRt0nkSAq0i8WEUJtd0ZQtHe5Q94dD
                              TLSH:29632957B98580BCC19BC178172FBA37EA73B5FD0364B22913E0E9363D55E610E298C9
                              File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@.....0.......0.................................Q.......Q.............h...............Q.td....................................................H...._........H........

                              ELF header

                              Class:ELF64
                              Data:2's complement, little endian
                              Version:1 (current)
                              Machine:Advanced Micro Devices X86-64
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x400194
                              Flags:0x0
                              ELF Header Size:64
                              Program Header Offset:64
                              Program Header Size:56
                              Number of Program Headers:3
                              Section Header Offset:66816
                              Section Header Size:64
                              Number of Section Headers:10
                              Header String Table Index:9
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x4000e80xe80x130x00x6AX001
                              .textPROGBITS0x4001000x1000xc3f60x00x6AX0016
                              .finiPROGBITS0x40c4f60xc4f60xe0x00x6AX001
                              .rodataPROGBITS0x40c5200xc5200x32100x00x2A0032
                              .ctorsPROGBITS0x5100000x100000x100x00x3WA008
                              .dtorsPROGBITS0x5100100x100100x100x00x3WA008
                              .dataPROGBITS0x5100400x100400x4800x00x3WA0032
                              .bssNOBITS0x5104c00x104c00x29a80x00x3WA0032
                              .shstrtabSTRTAB0x00x104c00x3e0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x4000000x4000000xf7300xf7306.31810x5R E0x100000.init .text .fini .rodata
                              LOAD0x100000x5100000x5100000x4c00x2e682.60810x6RW 0x100000.ctors .dtors .data .bss
                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                              TimestampSource PortDest PortSource IPDest IP
                              Apr 17, 2024 23:24:57.403553009 CEST4467233966192.168.2.1345.131.111.219
                              Apr 17, 2024 23:24:57.610157967 CEST339664467245.131.111.219192.168.2.13
                              Apr 17, 2024 23:24:57.610634089 CEST4467233966192.168.2.1345.131.111.219
                              Apr 17, 2024 23:24:57.610634089 CEST4467233966192.168.2.1345.131.111.219
                              Apr 17, 2024 23:24:57.817249060 CEST339664467245.131.111.219192.168.2.13
                              Apr 17, 2024 23:24:57.817557096 CEST4467233966192.168.2.1345.131.111.219
                              Apr 17, 2024 23:24:58.031827927 CEST339664467245.131.111.219192.168.2.13
                              Apr 17, 2024 23:25:28.154176950 CEST339664467245.131.111.219192.168.2.13
                              Apr 17, 2024 23:25:28.154397964 CEST4467233966192.168.2.1345.131.111.219
                              Apr 17, 2024 23:25:42.160569906 CEST4467233966192.168.2.1345.131.111.219
                              Apr 17, 2024 23:25:42.410106897 CEST339664467245.131.111.219192.168.2.13
                              Apr 17, 2024 23:25:53.171996117 CEST339664467245.131.111.219192.168.2.13
                              Apr 17, 2024 23:25:53.172451019 CEST4467233966192.168.2.1345.131.111.219
                              TimestampSource PortDest PortSource IPDest IP
                              Apr 17, 2024 23:24:57.170424938 CEST4684953192.168.2.138.8.8.8
                              Apr 17, 2024 23:24:57.275300980 CEST53468498.8.8.8192.168.2.13
                              Apr 17, 2024 23:24:57.275727987 CEST5994653192.168.2.138.8.8.8
                              Apr 17, 2024 23:24:57.403175116 CEST53599468.8.8.8192.168.2.13
                              Apr 17, 2024 23:27:40.086433887 CEST5087953192.168.2.131.1.1.1
                              Apr 17, 2024 23:27:40.086435080 CEST4750853192.168.2.131.1.1.1
                              Apr 17, 2024 23:27:40.191416979 CEST53508791.1.1.1192.168.2.13
                              Apr 17, 2024 23:27:40.191967964 CEST53475081.1.1.1192.168.2.13
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Apr 17, 2024 23:24:57.170424938 CEST192.168.2.138.8.8.80x55f1Standard query (0)kovey.mezo-api.xyzA (IP address)IN (0x0001)false
                              Apr 17, 2024 23:24:57.275727987 CEST192.168.2.138.8.8.80xbb37Standard query (0)kovey.mezo-api.xyzA (IP address)IN (0x0001)false
                              Apr 17, 2024 23:27:40.086433887 CEST192.168.2.131.1.1.10xcb34Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                              Apr 17, 2024 23:27:40.086435080 CEST192.168.2.131.1.1.10x438Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Apr 17, 2024 23:24:57.275300980 CEST8.8.8.8192.168.2.130x55f1No error (0)kovey.mezo-api.xyz45.131.111.219A (IP address)IN (0x0001)false
                              Apr 17, 2024 23:24:57.403175116 CEST8.8.8.8192.168.2.130xbb37No error (0)kovey.mezo-api.xyz45.131.111.219A (IP address)IN (0x0001)false
                              Apr 17, 2024 23:27:40.191416979 CEST1.1.1.1192.168.2.130xcb34No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                              Apr 17, 2024 23:27:40.191416979 CEST1.1.1.1192.168.2.130xcb34No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):21:24:56
                              Start date (UTC):17/04/2024
                              Path:/tmp/ClPVG70TmC.elf
                              Arguments:/tmp/ClPVG70TmC.elf
                              File size:67456 bytes
                              MD5 hash:25a8e0bc115a9b1ba4d74452f93bb857