Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
EOtMo9xTFK.elf

Overview

General Information

Sample name:EOtMo9xTFK.elf
renamed because original name is a hash value
Original sample name:6c3a700a58d2e98fc03e53ce0eef9e38.elf
Analysis ID:1427667
MD5:6c3a700a58d2e98fc03e53ce0eef9e38
SHA1:48bd6184c08d72c98d89fd5f077194e6c25bb7da
SHA256:f79aeac6047bf28872231a7c92c0e6bdb5648fca032a4485d6370625e021a646
Tags:32elfmiraimotorola
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Performs DNS queries to domains with low reputation
Queries the IP of a very long domain name
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427667
Start date and time:2024-04-17 23:24:18 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:EOtMo9xTFK.elf
renamed because original name is a hash value
Original Sample Name:6c3a700a58d2e98fc03e53ce0eef9e38.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/1@6/0
  • VT rate limit hit for: EOtMo9xTFK.elf
Command:/tmp/EOtMo9xTFK.elf
PID:5536
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5545, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 5545, Parent: 1383, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • systemd New Fork (PID: 5550, Parent: 1)
  • systemd-hostnamed (PID: 5550, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
EOtMo9xTFK.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    EOtMo9xTFK.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x13f6f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x13f83:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x13f97:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x13fab:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x13fbf:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x13fd3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x13fe7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x13ffb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1400f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x14023:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x14037:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1404b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1405f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x14073:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x14087:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1409b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x140af:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x140c3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x140d7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x140eb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x140ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5536.1.00007f1100001000.00007f1100018000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5536.1.00007f1100001000.00007f1100018000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x13f6f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x13f83:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x13f97:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x13fab:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x13fbf:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x13fd3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x13fe7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x13ffb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1400f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14023:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14037:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1404b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1405f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14073:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14087:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1409b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x140af:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x140c3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x140d7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x140eb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x140ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      Process Memory Space: EOtMo9xTFK.elf PID: 5536Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x42af:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x42c3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x42d7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x42eb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x42ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x4313:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x4327:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x433b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x434f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x4363:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x4377:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x438b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x439f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x43b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x43c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x43db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x43ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x4403:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x4417:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x442b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x443f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: EOtMo9xTFK.elfAvira: detected
      Source: EOtMo9xTFK.elfReversingLabs: Detection: 39%
      Source: EOtMo9xTFK.elfString: EOF/proc//proc/%s/cmdlinewgetcurlftpechokillbashrebootshutdownhaltpoweroff[locker] killed process: %s ;; pid: %d

      Networking

      barindex
      Source: DNS query: kovey.mezo-api.xyz
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.b> f:66a0PV!E(R:[5Yb> fc<OOPV!a0EA
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.b> f66a0PV!E(-:5hYb> fOOPV!a0EA
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.b> fp66a0PV!E(:5I%Yb> frOOPV!a0EA
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.b> f66a0PV!E(95Yb> fOOPV!a0EA
      Source: unknownDNS traffic detected: query: kovey.mezo-api.xyz.b> f66a0PV!E(e:H5PYb> fNNPV!a0E@
      Source: global trafficTCP traffic: 192.168.2.14:57258 -> 89.190.156.145:7733
      Source: global trafficTCP traffic: 192.168.2.14:40942 -> 45.131.111.219:33966
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownDNS traffic detected: queries for: kovey.mezo-api.xyz

      System Summary

      barindex
      Source: EOtMo9xTFK.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5536.1.00007f1100001000.00007f1100018000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: Process Memory Space: EOtMo9xTFK.elf PID: 5536, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)SIGKILL sent: pid: 1639, result: successfulJump to behavior
      Source: EOtMo9xTFK.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5536.1.00007f1100001000.00007f1100018000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: Process Memory Space: EOtMo9xTFK.elf PID: 5536, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: classification engineClassification label: mal84.troj.evad.linELF@0/1@6/0
      Source: /usr/libexec/gsd-rfkill (PID: 5545)Directory: <invalid fd (9)>/..Jump to behavior
      Source: /usr/libexec/gsd-rfkill (PID: 5545)Directory: <invalid fd (8)>/..Jump to behavior
      Source: /lib/systemd/systemd-hostnamed (PID: 5550)Directory: <invalid fd (10)>/..Jump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/917/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/11/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/12/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/13/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/14/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/15/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/16/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/17/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/18/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/19/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/1593/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/240/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/120/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/121/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/242/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/122/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/243/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/2/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/123/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/244/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/1589/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/3/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/124/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/245/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/1588/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/125/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/4/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/246/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/126/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/5/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/247/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/127/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/6/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/248/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/128/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/7/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/249/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/8/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/129/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/800/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/9/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/801/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/803/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/20/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/806/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/21/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/807/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/928/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/22/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/23/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/24/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/25/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/26/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/27/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/28/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/29/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/490/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/250/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/130/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/251/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/131/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/252/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/132/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/253/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/254/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/255/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/135/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/256/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/1599/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/257/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/378/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/258/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/259/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/30/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/35/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/1371/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/260/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/261/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/262/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/142/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/263/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/264/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/265/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/145/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/266/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/1369/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/267/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/268/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/269/cmdlineJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5540)File opened: /proc/940/cmdlineJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/EOtMo9xTFK.elf (PID: 5538)File: /tmp/EOtMo9xTFK.elfJump to behavior
      Source: /tmp/EOtMo9xTFK.elf (PID: 5536)Queries kernel information via 'uname': Jump to behavior
      Source: /lib/systemd/systemd-hostnamed (PID: 5550)Queries kernel information via 'uname': Jump to behavior
      Source: EOtMo9xTFK.elf, 5536.1.00007ffee87db000.00007ffee87fc000.rw-.sdmpBinary or memory string: rax86_64/usr/bin/qemu-m68k/tmp/EOtMo9xTFK.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/EOtMo9xTFK.elf
      Source: EOtMo9xTFK.elf, 5536.1.00007ffee87db000.00007ffee87fc000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
      Source: EOtMo9xTFK.elf, 5536.1.000055fa24121000.000055fa241a6000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
      Source: EOtMo9xTFK.elf, 5536.1.00007ffee87db000.00007ffee87fc000.rw-.sdmpBinary or memory string: /tmp/qemu-open.sQEKTP
      Source: EOtMo9xTFK.elf, 5536.1.00007ffee87db000.00007ffee87fc000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
      Source: EOtMo9xTFK.elf, 5536.1.000055fa24121000.000055fa241a6000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
      Source: EOtMo9xTFK.elf, 5536.1.00007ffee87db000.00007ffee87fc000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.sQEKTP\

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: EOtMo9xTFK.elf, type: SAMPLE
      Source: Yara matchFile source: 5536.1.00007f1100001000.00007f1100018000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: EOtMo9xTFK.elf, type: SAMPLE
      Source: Yara matchFile source: 5536.1.00007f1100001000.00007f1100018000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Scripting
      Path Interception1
      Hidden Files and Directories
      1
      OS Credential Dumping
      11
      Security Software Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      File Deletion
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      EOtMo9xTFK.elf39%ReversingLabsLinux.Trojan.Mirai
      EOtMo9xTFK.elf100%AviraEXP/ELF.Mirai.Z.A
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      kovey.mezo-api.xyz
      45.131.111.219
      truetrue
        unknown
        kovey.mezo-api.xyz.b> f:66a0PV!E(R:[5Yb> fc<OOPV!a0EA
        unknown
        unknowntrue
          unknown
          kovey.mezo-api.xyz.b> f66a0PV!E(e:H5PYb> fNNPV!a0E@
          unknown
          unknowntrue
            unknown
            kovey.mezo-api.xyz.b> f66a0PV!E(95Yb> fOOPV!a0EA
            unknown
            unknowntrue
              unknown
              kovey.mezo-api.xyz.b> f66a0PV!E(-:5hYb> fOOPV!a0EA
              unknown
              unknowntrue
                unknown
                kovey.mezo-api.xyz.b> fp66a0PV!E(:5I%Yb> frOOPV!a0EA
                unknown
                unknowntrue
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  45.131.111.219
                  kovey.mezo-api.xyzGermany
                  398373SERVERDESTROYERSUStrue
                  89.190.156.145
                  unknownUnited Kingdom
                  7489HOSTUS-GLOBAL-ASHostUSHKfalse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  45.131.111.219epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                    YLjhvMJyOO.elfGet hashmaliciousMiraiBrowse
                      8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                        LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                          Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                            RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                              CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                                Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                                  sMmzRMu1P6.elfGet hashmaliciousMiraiBrowse
                                    NvmCe2XrqN.elfGet hashmaliciousMiraiBrowse
                                      89.190.156.145epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                        8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                          LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                            Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                                              RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                                                CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                                                  Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                                                    sMmzRMu1P6.elfGet hashmaliciousMiraiBrowse
                                                      aNeRrtorRm.elfGet hashmaliciousMiraiBrowse
                                                        LiZXGg7fyH.elfGet hashmaliciousUnknownBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          kovey.mezo-api.xyz8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          NvmCe2XrqN.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          HOSTUS-GLOBAL-ASHostUSHKepLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          sMmzRMu1P6.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          aNeRrtorRm.elfGet hashmaliciousMiraiBrowse
                                                          • 89.190.156.145
                                                          XoJZcyGnfc.elfGet hashmaliciousGafgytBrowse
                                                          • 89.190.156.227
                                                          SERVERDESTROYERSUSepLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          YLjhvMJyOO.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          sMmzRMu1P6.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          NvmCe2XrqN.elfGet hashmaliciousMiraiBrowse
                                                          • 45.131.111.219
                                                          No context
                                                          No context
                                                          Process:/tmp/EOtMo9xTFK.elf
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):30
                                                          Entropy (8bit):4.481727678869737
                                                          Encrypted:false
                                                          SSDEEP:3:Tgix4s+HJN:TgixkJN
                                                          MD5:DC0919E1DF4B1114B6A418E18D0A7516
                                                          SHA1:5C6918B6C04A703C4A479B5F302E648F076F1834
                                                          SHA-256:67578A0E95FBA72D62157E76881027E7C3B1DFC70D02CE5960DE9BBC4FBCE240
                                                          SHA-512:80274676EC3D3E3A1FE76F5724890EFA44EF8439D86253BC99D360E9B5C94FBCEF23FE35D0896E73E0445BDEBCA62984DA22AF610978B3302F7628AA57CF3772
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:/tmp/EOtMo9xTFK.elf.nwlrbbmqbh
                                                          File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                                          Entropy (8bit):6.259526425575277
                                                          TrID:
                                                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                          File name:EOtMo9xTFK.elf
                                                          File size:93'144 bytes
                                                          MD5:6c3a700a58d2e98fc03e53ce0eef9e38
                                                          SHA1:48bd6184c08d72c98d89fd5f077194e6c25bb7da
                                                          SHA256:f79aeac6047bf28872231a7c92c0e6bdb5648fca032a4485d6370625e021a646
                                                          SHA512:72b61e21bf16b157c06e3442534d4a0e13af1953d09aad16e93f3aa91768566ad395282d4b8d243f2e38f2086c729779c3aff11103c84dbe60fa5f40dfabda4b
                                                          SSDEEP:1536:LdWTHUOl+6GpBrLti0w8MyoQkIGmCSdc14T7/KNe8bUzhksCOnl2SV:LdWTN7GvrLti0KyoQkFSe1G6bUzCsCOT
                                                          TLSH:5C934DC7F400DD7DF80EEA7A04634D0AB531B3E116831B767797B963AD322952922EC2
                                                          File Content Preview:.ELF.......................D...4..jH.....4. ...(......................e...e....... .......e............0..%....... .dt.Q............................NV..a....da...=.N^NuNV..J9....f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy..e.N.X.........N^NuNV..N^NuN

                                                          ELF header

                                                          Class:ELF32
                                                          Data:2's complement, big endian
                                                          Version:1 (current)
                                                          Machine:MC68000
                                                          Version Number:0x1
                                                          Type:EXEC (Executable file)
                                                          OS/ABI:UNIX - System V
                                                          ABI Version:0
                                                          Entry Point Address:0x80000144
                                                          Flags:0x0
                                                          ELF Header Size:52
                                                          Program Header Offset:52
                                                          Program Header Size:32
                                                          Number of Program Headers:3
                                                          Section Header Offset:92744
                                                          Section Header Size:40
                                                          Number of Section Headers:10
                                                          Header String Table Index:9
                                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                          NULL0x00x00x00x00x0000
                                                          .initPROGBITS0x800000940x940x140x00x6AX002
                                                          .textPROGBITS0x800000a80xa80x13dea0x00x6AX004
                                                          .finiPROGBITS0x80013e920x13e920xe0x00x6AX002
                                                          .rodataPROGBITS0x80013ea00x13ea00x27330x00x2A002
                                                          .ctorsPROGBITS0x800185d80x165d80x80x00x3WA004
                                                          .dtorsPROGBITS0x800185e00x165e00x80x00x3WA004
                                                          .dataPROGBITS0x800185ec0x165ec0x41c0x00x3WA004
                                                          .bssNOBITS0x80018a080x16a080x21bc0x00x3WA004
                                                          .shstrtabSTRTAB0x00x16a080x3e0x00x0001
                                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                          LOAD0x00x800000000x800000000x165d30x165d36.28210x5R E0x2000.init .text .fini .rodata
                                                          LOAD0x165d80x800185d80x800185d80x4300x25ec3.73790x6RW 0x2000.ctors .dtors .data .bss
                                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 17, 2024 23:25:15.360450029 CEST572587733192.168.2.1489.190.156.145
                                                          Apr 17, 2024 23:25:15.480051041 CEST4094233966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:15.684313059 CEST339664094245.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:15.684452057 CEST4094233966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:15.684813976 CEST4094233966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:15.888926983 CEST339664094245.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:15.890237093 CEST4094233966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:16.094433069 CEST339664094245.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:16.377549887 CEST572587733192.168.2.1489.190.156.145
                                                          Apr 17, 2024 23:25:18.393436909 CEST572587733192.168.2.1489.190.156.145
                                                          Apr 17, 2024 23:25:22.489371061 CEST572587733192.168.2.1489.190.156.145
                                                          Apr 17, 2024 23:25:30.681018114 CEST572587733192.168.2.1489.190.156.145
                                                          Apr 17, 2024 23:25:31.096477032 CEST339664094245.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:31.096853971 CEST4094233966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:46.328285933 CEST339664094245.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:46.328543901 CEST4094233966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:46.808252096 CEST572587733192.168.2.1489.190.156.145
                                                          Apr 17, 2024 23:25:53.170289040 CEST339664094245.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:53.171158075 CEST4094233966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:53.375462055 CEST339664094245.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:55.227593899 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:55.434349060 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:55.434727907 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:55.434727907 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:55.641659021 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:25:55.641856909 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:25:55.848972082 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:26:10.852293015 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:26:10.852670908 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:26:19.575042009 CEST572587733192.168.2.1489.190.156.145
                                                          Apr 17, 2024 23:26:26.060189962 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:26:26.060637951 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:26:35.470158100 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:26:35.677061081 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:26:45.479862928 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:26:45.687347889 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:27:00.830487013 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:27:00.830682993 CEST4094433966192.168.2.1445.131.111.219
                                                          Apr 17, 2024 23:27:16.040518045 CEST339664094445.131.111.219192.168.2.14
                                                          Apr 17, 2024 23:27:16.040872097 CEST4094433966192.168.2.1445.131.111.219
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 17, 2024 23:25:14.851686001 CEST6069653192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:14.956792116 CEST53606968.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:14.957375050 CEST4064053192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:15.061755896 CEST53406408.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:15.061959028 CEST5665553192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:15.166348934 CEST53566558.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:15.166471958 CEST5589353192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:15.270967007 CEST53558938.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:15.271075010 CEST4224353192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:15.375581980 CEST53422438.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:15.375675917 CEST4606653192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:15.479870081 CEST53460668.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:54.172211885 CEST4423453192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:54.277158976 CEST53442348.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:54.277602911 CEST5709453192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:54.382416010 CEST53570948.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:54.382744074 CEST5639353192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:54.487617016 CEST53563938.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:54.488071918 CEST5935853192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:54.592816114 CEST53593588.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:54.593404055 CEST5558253192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:54.698385000 CEST53555828.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:54.698895931 CEST3882053192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:54.805078983 CEST53388208.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:54.805404902 CEST3530953192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:54.909984112 CEST53353098.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:54.910507917 CEST4727553192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:55.015935898 CEST53472758.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:55.016289949 CEST3428353192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:55.121088028 CEST53342838.8.8.8192.168.2.14
                                                          Apr 17, 2024 23:25:55.121604919 CEST4342053192.168.2.148.8.8.8
                                                          Apr 17, 2024 23:25:55.226840973 CEST53434208.8.8.8192.168.2.14
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Apr 17, 2024 23:25:14.851686001 CEST192.168.2.148.8.8.80xd8d1Standard query (0)kovey.mezo-api.xyzA (IP address)IN (0x0001)false
                                                          Apr 17, 2024 23:25:54.172211885 CEST192.168.2.148.8.8.80xe559Standard query (0)kovey.mezo-api.xyz.b> f:66a0PV!E(R:[5Yb> fc<OOPV!a0EA3462464false
                                                          Apr 17, 2024 23:25:54.277602911 CEST192.168.2.148.8.8.80xe559Standard query (0)kovey.mezo-api.xyz.b> f66a0PV!E(-:5hYb> fOOPV!a0EA4076864false
                                                          Apr 17, 2024 23:25:54.382744074 CEST192.168.2.148.8.8.80xe559Standard query (0)kovey.mezo-api.xyz.b> fp66a0PV!E(:5I%Yb> frOOPV!a0EA4230464false
                                                          Apr 17, 2024 23:25:54.488071918 CEST192.168.2.148.8.8.80xe559Standard query (0)kovey.mezo-api.xyz.b> f66a0PV!E(95Yb> fOOPV!a0EA4563264false
                                                          Apr 17, 2024 23:25:54.593404055 CEST192.168.2.148.8.8.80xe559Standard query (0)kovey.mezo-api.xyz.b> f66a0PV!E(e:H5PYb> fNNPV!a0E@5049664false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Apr 17, 2024 23:25:14.956792116 CEST8.8.8.8192.168.2.140xd8d1No error (0)kovey.mezo-api.xyz45.131.111.219A (IP address)IN (0x0001)false

                                                          System Behavior

                                                          Start time (UTC):21:25:14
                                                          Start date (UTC):17/04/2024
                                                          Path:/tmp/EOtMo9xTFK.elf
                                                          Arguments:/tmp/EOtMo9xTFK.elf
                                                          File size:4463432 bytes
                                                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                          Start time (UTC):21:25:14
                                                          Start date (UTC):17/04/2024
                                                          Path:/tmp/EOtMo9xTFK.elf
                                                          Arguments:-
                                                          File size:4463432 bytes
                                                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                          Start time (UTC):21:25:14
                                                          Start date (UTC):17/04/2024
                                                          Path:/tmp/EOtMo9xTFK.elf
                                                          Arguments:-
                                                          File size:4463432 bytes
                                                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                          Start time (UTC):21:25:14
                                                          Start date (UTC):17/04/2024
                                                          Path:/usr/libexec/gnome-session-binary
                                                          Arguments:-
                                                          File size:334664 bytes
                                                          MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                                          Start time (UTC):21:25:14
                                                          Start date (UTC):17/04/2024
                                                          Path:/bin/sh
                                                          Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):21:25:15
                                                          Start date (UTC):17/04/2024
                                                          Path:/usr/libexec/gsd-rfkill
                                                          Arguments:/usr/libexec/gsd-rfkill
                                                          File size:51808 bytes
                                                          MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                                                          Start time (UTC):21:25:15
                                                          Start date (UTC):17/04/2024
                                                          Path:/usr/lib/systemd/systemd
                                                          Arguments:-
                                                          File size:1620224 bytes
                                                          MD5 hash:9b2bec7092a40488108543f9334aab75

                                                          Start time (UTC):21:25:15
                                                          Start date (UTC):17/04/2024
                                                          Path:/lib/systemd/systemd-hostnamed
                                                          Arguments:/lib/systemd/systemd-hostnamed
                                                          File size:35040 bytes
                                                          MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65