Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
QpHMHEg6OQ.elf

Overview

General Information

Sample name:QpHMHEg6OQ.elf
renamed because original name is a hash value
Original sample name:3df59e66242b59fc077970fa0f3c74d82a24c673394969041133f8bee8c70775.elf
Analysis ID:1428258
MD5:e97eef55eb472d2ade9bc98b43ba2eec
SHA1:426529f6ce6e495a669d00a542bc4c7ef3722e53
SHA256:3df59e66242b59fc077970fa0f3c74d82a24c673394969041133f8bee8c70775
Infos:

Detection

Chaos
Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Chaos
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Non-zero exit code suggests an error during the execution. Lookup the error code for hints.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428258
Start date and time:2024-04-18 18:29:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 37s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:QpHMHEg6OQ.elf
renamed because original name is a hash value
Original Sample Name:3df59e66242b59fc077970fa0f3c74d82a24c673394969041133f8bee8c70775.elf
Detection:MAL
Classification:mal56.troj.linELF@0/2@2/0
  • VT rate limit hit for: QpHMHEg6OQ.elf
Command:/tmp/QpHMHEg6OQ.elf
PID:5487
Exit Code:135
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • QpHMHEg6OQ.elf (PID: 5487, Parent: 5412, MD5: 801a06b4e0ed2dca89cbfa1f900a483d) Arguments: /tmp/QpHMHEg6OQ.elf
  • sshd New Fork (PID: 5549, Parent: 940)
  • sshd (PID: 5549, Parent: 940, MD5: dbca7a6bbf7bf57fedac243d4b2cb340) Arguments: /usr/sbin/sshd -D -R
  • sshd New Fork (PID: 5557, Parent: 940)
  • sshd (PID: 5557, Parent: 940, MD5: dbca7a6bbf7bf57fedac243d4b2cb340) Arguments: /usr/sbin/sshd -D -R
    • sshd New Fork (PID: 5558, Parent: 5557)
  • sshd New Fork (PID: 5561, Parent: 940)
  • sshd (PID: 5561, Parent: 940, MD5: dbca7a6bbf7bf57fedac243d4b2cb340) Arguments: /usr/sbin/sshd -D -R
    • sshd New Fork (PID: 5562, Parent: 5561)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ChaosMulti-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.chaos
SourceRuleDescriptionAuthorStrings
QpHMHEg6OQ.elfJoeSecurity_ChaosGoYara detected ChaosJoe Security
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: QpHMHEg6OQ.elfReversingLabs: Detection: 47%
    Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: QpHMHEg6OQ.elfString found in binary or memory: http2: Transport conn %p received error from processing frame %v: %vhttp2: Transport received unsolicited DATA frame; closing connectionhttp: message cannot contain multiple Content-Length headers; got %qpadding bytes must all be zeros unless AllowIllegalWrites is enabledreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerhttp2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)tls: handshake message of length %d bytes exceeds maximum of %d bytestls: peer doesn't support the certificate custom signature algorithmsbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xgot %s for stream %d; expected CONTINUATION following %s for stream %dx509: PKCS#8 wrapping contained private key with unknown algorithm: %vx509: certificate relies on legacy Common Name field, use SANs insteadMozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)Sogou Pic Spider/3.0(+http://www.sogou.com/docs/help/webmasters.htm#07)Sogou web spider/4.0(+http://www.sogou.com/docs/help/webmasters.htm#07)dynamic table size update MUST occur at the beginning of a header blockssh: no common algorithm for %s; client offered: %v, server offered: %vtls: peer doesn't support any of the certificate's signature algorithmstoo many concurrent operations on a single file or socket (max 1048575)x509: issuer has name constraints but leaf doesn't have a SAN extensionMozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)tls: server's certificate contains an unsupported type of public key: %Ttls: received unexpected handshake message of type %T when waiting for %T91289437fa036b34da55d57af6192768c27bd433fa012169d626d934e0051b24dd67dd3cf49d7cc827bc012d259d7ac226e70829239d7ac226e7082968de60d520eb433722c07fd236f6crypto/elliptic: internal error: Unmarshal rejected a valid point encodingmalformed response from server: malformed non-numeric status pseudo headernet/http: server replied with more than declared Content-Length; truncatedtls: certificate RSA key size too small for supported signature algorithmsUnsolicited response received on idle HTTP channel starting with %q; err=%vtls: internal error: attempted to read record with pending application datatls: failed to send closeNotify alert (but connection was closed anyway): %wtls: server certificate contains incorrect key type for selected ciphersuite((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})(\.((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})){3}MapIter.Next called on an iterator that does not have an associated map Valuecrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled115792089210356248762697446949407573529996955224135760342422259061068512044369115792089210356248762697446949407573530086143415290314195533631308867097853951ssh: internal error: algorithmSignerWrapper invoked with non-default algorithmssh: unable to authenticate, attempted methods %v, no supported methods remainx509: signature check attempt
    Source: QpHMHEg6OQ.elfString found in binary or memory: http: RoundTripper implementation (%T) returned a nil *Response with a nil errortls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificaterefusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxyx509: a root or intermediate certificate is not authorized to sign for this name: (possibly because of %q while trying to verify candidate authority certificate %q)Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)x509: issuer has name constraints but leaf contains unknown or unconstrained name: tls: downgrade attempt detected, possibly due to a MitM attack or a broken middleboxx509: signature algorithm specifies an %s public key, but have public key of type %Treflect.Value.Interface: cannot return value obtained from unexported field or methodx509: failed to parse private key (use ParseECPrivateKey instead for this key format)Mozilla/5.0 (compatible; YoudaoBot/1.0; http://www.youdao.com/help/webmaster/spider/;)reflect: New of type that may not be allocated in heap (possibly undefined cgo C type)x509: a root or intermediate certificate is not authorized for an extended key usage: fxfzUc6gtMGc/i26ld3KydGKy1k7QqyMMyxjbU1Rlk+F9LQxnaTeCHGHsDUpaBeOWDeY6l+2kHlB7EWTLcGwfg==whv+Kf1cEtOXzr+zuvmef2as0WfbUDm8l2LMWBMel10NDnbShg9CsMUt327VJhOTbXLoPYJVTKy8MBPCVwoT8A==x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%qapplication/xml,application/xhtml+xml,text/html;q=0.9, text/plain;q=0.8,image/png,*/*;q=0.5tls: handshake hash for a client certificate requested after discarding the handshake buffertls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKey3617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b1ce1d7e819d7a431d7c90ea0e5faa87ca22be8b05378eb1c71ef320ad746e1d3b628ba79b9859f741e082542a385502f25dbf55296c3a545e3872760ab7b3312fa7e23ee7e4988e056be3f82d19181d9c6efe8141120314088f5013875ac656398d8a2ed19d2a85c8edd3ec2aefhttp: RoundTripper implementation (%T) returned a *Response with content length %d but a nil BodyNoClientCertRequestClientCertRequireAnyClientCertVerifyClientCertIfGivenRequireAndVerifyClientCertcipher: the nonce can't have zero length, or the security of the key will be immediately compromised1920<<RMS>> equals www.yahoo.com (Yahoo)
    Source: unknownDNS traffic detected: queries for: daisy.ubuntu.com
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)x509:
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://search.msn.com/msnbot.htm
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.baidu.com/search/spider.html)
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.baidu.com/search/spider.html)Mozilla/5.0
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.baidu.com/search/spider.html)http2:
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.entireweb.com/about/search_tech/speedy_spider/)text/html
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.google.com/mobile/adsbot.html)
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.haosou.com/help/help_3_2.htmlMozilla/5.0
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://www.youdao.com/help/webmaster/spider/;)reflect:
    Source: QpHMHEg6OQ.elfString found in binary or memory: http://yandex.com/bots)http:
    Source: QpHMHEg6OQ.elfString found in binary or memory: https://search.yahoo.com/search?p=illegal
    Source: QpHMHEg6OQ.elfString found in binary or memory: https://www.baidu.com/s?wd=insufficient
    Source: QpHMHEg6OQ.elfString found in binary or memory: https://www.so.com/s?q=index
    Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: classification engineClassification label: mal56.troj.linELF@0/2@2/0
    Source: ELF file sectionSubmission: QpHMHEg6OQ.elf
    Source: /tmp/QpHMHEg6OQ.elf (PID: 5487)Queries kernel information via 'uname': Jump to behavior
    Source: QpHMHEg6OQ.elf, 5487.1.00007fffca1b5000.00007fffca1d6000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips64
    Source: QpHMHEg6OQ.elf, 5487.1.00007fffca1b5000.00007fffca1d6000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips64/tmp/QpHMHEg6OQ.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/QpHMHEg6OQ.elf
    Source: QpHMHEg6OQ.elf, 5487.1.0000560fe4a26000.0000560fe4aac000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/mips641RelativeDistinguishedName
    Source: QpHMHEg6OQ.elf, 5487.1.0000560fe4a26000.0000560fe4aac000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips64

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: QpHMHEg6OQ.elf, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: QpHMHEg6OQ.elf, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
    Security Software Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1428258 Sample: QpHMHEg6OQ.elf Startdate: 18/04/2024 Architecture: LINUX Score: 56 19 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->19 21 daisy.ubuntu.com 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Yara detected Chaos 2->25 7 sshd sshd 2->7         started        9 sshd sshd 2->9         started        11 sshd sshd 2->11         started        13 QpHMHEg6OQ.elf 2->13         started        signatures3 process4 process5 15 sshd 7->15         started        17 sshd 9->17         started       
    SourceDetectionScannerLabelLink
    QpHMHEg6OQ.elf47%ReversingLabsLinux.Trojan.Kaiji
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    daisy.ubuntu.com
    162.213.35.24
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.baidu.com/search/spider.html)QpHMHEg6OQ.elffalse
        high
        http://search.msn.com/msnbot.htmQpHMHEg6OQ.elffalse
          high
          http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829QpHMHEg6OQ.elffalse
            high
            https://www.so.com/s?q=indexQpHMHEg6OQ.elffalse
              high
              http://help.yahoo.com/help/us/ysearch/slurp)x509:QpHMHEg6OQ.elffalse
                high
                http://www.google.com/mobile/adsbot.html)QpHMHEg6OQ.elffalse
                  high
                  http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0QpHMHEg6OQ.elffalse
                    unknown
                    http://www.baidu.com/search/spider.html)http2:QpHMHEg6OQ.elffalse
                      high
                      http://yandex.com/bots)http:QpHMHEg6OQ.elffalse
                        high
                        http://www.baidu.com/search/spider.html)Mozilla/5.0QpHMHEg6OQ.elffalse
                          high
                          http://www.entireweb.com/about/search_tech/speedy_spider/)text/htmlQpHMHEg6OQ.elffalse
                            high
                            http://www.haosou.com/help/help_3_2.htmlMozilla/5.0QpHMHEg6OQ.elffalse
                              high
                              https://www.baidu.com/s?wd=insufficientQpHMHEg6OQ.elffalse
                                high
                                http://www.youdao.com/help/webmaster/spider/;)reflect:QpHMHEg6OQ.elffalse
                                  high
                                  https://search.yahoo.com/search?p=illegalQpHMHEg6OQ.elffalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    185.125.190.26
                                    unknownUnited Kingdom
                                    41231CANONICAL-ASGBfalse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    185.125.190.26c1N1s54Xz4.elfGet hashmaliciousMirai, OkiruBrowse
                                      sNUnKpshtR.elfGet hashmaliciousMirai, OkiruBrowse
                                        0tGEmgFUHk.elfGet hashmaliciousUnknownBrowse
                                          FMBz4fK3Fo.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            QjPaP60iGb.elfGet hashmaliciousUnknownBrowse
                                              jPa5GP7YWR.elfGet hashmaliciousMiraiBrowse
                                                arm.elfGet hashmaliciousUnknownBrowse
                                                  AkV7DALWTe.elfGet hashmaliciousMiraiBrowse
                                                    n3l6rOHrCy.elfGet hashmaliciousMiraiBrowse
                                                      f0OnF0zQl1.elfGet hashmaliciousMiraiBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        daisy.ubuntu.comSecuriteInfo.com.ELF.FastReverseProxy-D.9265.18798.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.25
                                                        vlxx.mpsl-20240418-1122.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 162.213.35.25
                                                        vlxx.arm-20240418-1121.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 162.213.35.24
                                                        vlxx.arm6-20240418-1122.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 162.213.35.24
                                                        vlxx.mips-20240418-1121.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 162.213.35.24
                                                        Re1KEqd51P.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.24
                                                        zWcs7vPDze.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.25
                                                        t6iaSepbJj.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.24
                                                        Y0CvjdFFCW.elfGet hashmaliciousMiraiBrowse
                                                        • 162.213.35.24
                                                        LBvIphWDPb.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 162.213.35.24
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CANONICAL-ASGBROxR8Lw6ug.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 91.189.91.42
                                                        c1N1s54Xz4.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 185.125.190.26
                                                        sNUnKpshtR.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 185.125.190.26
                                                        c3S6vyQXOw.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 91.189.91.42
                                                        MQ9rEJYn2l.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 91.189.91.42
                                                        SecuriteInfo.com.Linux.Mirai.671.6996.10117.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        vlxx.x86-20240418-1121.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 91.189.91.42
                                                        SecuriteInfo.com.ELF.Mirai-CFS.4575.1789.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 91.189.91.42
                                                        MDgLVYI6gp.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        EqELq6RpbL.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        No context
                                                        No context
                                                        Process:/usr/sbin/sshd
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):384
                                                        Entropy (8bit):0.8735982127940438
                                                        Encrypted:false
                                                        SSDEEP:3:DSaDLwbXWXcDltlN2/l:DTMbGsDXm/
                                                        MD5:A15E858070C095074618D085C84B2303
                                                        SHA1:1BC82C1F5FA71ED917498BE06F7F57AFD4C073F6
                                                        SHA-256:2E7463155079EC5FBD37E163DEBB26C3E9492BB0AF547E16737F0A52218A3D9B
                                                        SHA-512:187B980DEDD11B3710EBA691515AA65C090D489255865BB464F513454FD5A5630E17324C8BA25122BC2BB90694C1B221A3CA30AD15AFB8F927E52D156B1E9D04
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:........ssh:notty...........................root............................192.168.2.23.............................................................................................................................................................................................................................................................J!f........................................
                                                        File type:ELF 64-bit MSB executable, MIPS, MIPS-III version 1 (SYSV), statically linked, Go BuildID=531EpRgthPZPt3knqoKK/ayf51kNy_prNzbkXr_MN/zxjogFIOCYVVIxufPI04/tQgJURn6GO8NPfNwspcu, stripped
                                                        Entropy (8bit):5.36010071783001
                                                        TrID:
                                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                        File name:QpHMHEg6OQ.elf
                                                        File size:4'786'658 bytes
                                                        MD5:e97eef55eb472d2ade9bc98b43ba2eec
                                                        SHA1:426529f6ce6e495a669d00a542bc4c7ef3722e53
                                                        SHA256:3df59e66242b59fc077970fa0f3c74d82a24c673394969041133f8bee8c70775
                                                        SHA512:d173b5f3aff15acb0889fe28f1a409540c14d8bd18d1934f17f446b4c6d2bd084c3537705e23271d8e6afda61392fef3c457afdb4ff9964587db17ee02d3e097
                                                        SSDEEP:49152:XralYsYZ/MjJ7fhP2pCQLg1xbnZdY3MnO:Xr9lMjJ7fcjd
                                                        TLSH:9A26F712BF98ED2FD694213187B7C23033D57D1481E07433AA96E71E2EAE275991BDC8
                                                        File Content Preview:.ELF...................................@........ ....@.8...@...................@.......@.......@...............................................................d.......d.............................................0.......0.......................1.......2.

                                                        ELF header

                                                        Class:ELF64
                                                        Data:2's complement, big endian
                                                        Version:1 (current)
                                                        Machine:MIPS R3000
                                                        Version Number:0x1
                                                        Type:EXEC (Executable file)
                                                        OS/ABI:UNIX - System V
                                                        ABI Version:0
                                                        Entry Point Address:0x90000
                                                        Flags:0x20000004
                                                        ELF Header Size:64
                                                        Program Header Offset:64
                                                        Program Header Size:56
                                                        Number of Program Headers:7
                                                        Section Header Offset:456
                                                        Section Header Size:64
                                                        Number of Section Headers:14
                                                        Header String Table Index:3
                                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                        NULL0x00x00x00x00x0000
                                                        .textPROGBITS0x110000x10000x30dbf00x00x6AX008
                                                        .rodataPROGBITS0x3200000x3100000xf91340x00x2A0032
                                                        .shstrtabSTRTAB0x00x4091400xa50x00x0001
                                                        .typelinkPROGBITS0x4192000x4092000x17c80x00x2A0032
                                                        .itablinkPROGBITS0x41a9e00x40a9e00x9480x00x2A0032
                                                        .gosymtabPROGBITS0x41b3280x40b3280x00x00x2A001
                                                        .gopclntabPROGBITS0x41b3400x40b3400x14bcb80x00x2A0032
                                                        .go.buildinfoPROGBITS0x5700000x5600000xf00x00x3WA0016
                                                        .noptrdataPROGBITS0x5701000x5601000x31e180x00x3WA0032
                                                        .dataPROGBITS0x5a1f200x591f200xfe800x00x3WA0032
                                                        .bssNOBITS0x5b1da00x5a1da00x301000x00x3WA0032
                                                        .noptrbssNOBITS0x5e1ea00x5d1ea00xf5700x00x3WA0032
                                                        .note.go.buildidNOTE0x10f9c0xf9c0x640x00x2A004
                                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                        PHDR0x400x100400x100400x1880x1881.50300x4R 0x10000
                                                        NOTE0xf9c0x10f9c0x10f9c0x640x645.31720x4R 0x4.note.go.buildid
                                                        LOAD0x00x100000x100000x30ebf00x30ebf05.13710x5R E0x10000.text .note.go.buildid
                                                        LOAD0x3100000x3200000x3200000x246ff80x246ff85.26830x4R 0x10000.rodata .typelink .itablink .gosymtab .gopclntab
                                                        LOAD0x5600000x5700000x5700000x41da00x814100.00000x6RW 0x10000.go.buildinfo .noptrdata .data .bss .noptrbss
                                                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                                        LOOS+50415800x00x00x00x00x00.00000x2a00 0x8
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 18, 2024 18:30:02.502614975 CEST46540443192.168.2.14185.125.190.26
                                                        Apr 18, 2024 18:30:32.709403038 CEST46540443192.168.2.14185.125.190.26
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 18, 2024 18:29:54.203402042 CEST5905753192.168.2.141.1.1.1
                                                        Apr 18, 2024 18:29:54.203476906 CEST4518153192.168.2.141.1.1.1
                                                        Apr 18, 2024 18:29:54.307931900 CEST53451811.1.1.1192.168.2.14
                                                        Apr 18, 2024 18:29:54.308363914 CEST53590571.1.1.1192.168.2.14
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Apr 18, 2024 18:29:54.203402042 CEST192.168.2.141.1.1.10xc681Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                        Apr 18, 2024 18:29:54.203476906 CEST192.168.2.141.1.1.10x836fStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Apr 18, 2024 18:29:54.308363914 CEST1.1.1.1192.168.2.140xc681No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                                        Apr 18, 2024 18:29:54.308363914 CEST1.1.1.1192.168.2.140xc681No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                                        System Behavior

                                                        Start time (UTC):16:29:51
                                                        Start date (UTC):18/04/2024
                                                        Path:/tmp/QpHMHEg6OQ.elf
                                                        Arguments:/tmp/QpHMHEg6OQ.elf
                                                        File size:5830456 bytes
                                                        MD5 hash:801a06b4e0ed2dca89cbfa1f900a483d

                                                        Start time (UTC):16:30:17
                                                        Start date (UTC):18/04/2024
                                                        Path:/usr/sbin/sshd
                                                        Arguments:-
                                                        File size:876328 bytes
                                                        MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

                                                        Start time (UTC):16:30:17
                                                        Start date (UTC):18/04/2024
                                                        Path:/usr/sbin/sshd
                                                        Arguments:/usr/sbin/sshd -D -R
                                                        File size:876328 bytes
                                                        MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

                                                        Start time (UTC):16:30:17
                                                        Start date (UTC):18/04/2024
                                                        Path:/usr/sbin/sshd
                                                        Arguments:-
                                                        File size:876328 bytes
                                                        MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

                                                        Start time (UTC):16:30:17
                                                        Start date (UTC):18/04/2024
                                                        Path:/usr/sbin/sshd
                                                        Arguments:/usr/sbin/sshd -D -R
                                                        File size:876328 bytes
                                                        MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

                                                        Start time (UTC):16:30:17
                                                        Start date (UTC):18/04/2024
                                                        Path:/usr/sbin/sshd
                                                        Arguments:-
                                                        File size:876328 bytes
                                                        MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

                                                        Start time (UTC):16:30:22
                                                        Start date (UTC):18/04/2024
                                                        Path:/usr/sbin/sshd
                                                        Arguments:-
                                                        File size:876328 bytes
                                                        MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

                                                        Start time (UTC):16:30:22
                                                        Start date (UTC):18/04/2024
                                                        Path:/usr/sbin/sshd
                                                        Arguments:/usr/sbin/sshd -D -R
                                                        File size:876328 bytes
                                                        MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

                                                        Start time (UTC):16:30:23
                                                        Start date (UTC):18/04/2024
                                                        Path:/usr/sbin/sshd
                                                        Arguments:-
                                                        File size:876328 bytes
                                                        MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340