Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
qIEANK2huJ.elf

Overview

General Information

Sample name:qIEANK2huJ.elf
renamed because original name is a hash value
Original sample name:ea43929d4909e3e587276556a147b594.elf
Analysis ID:1428673
MD5:ea43929d4909e3e587276556a147b594
SHA1:4d6282015ca7a645c01571f9c8d8456a2f50fc23
SHA256:51ec23564f60188b7a2d834d6a3438bbd104e6ebc931036fa70013be854b46ee
Tags:64elfmirai
Infos:

Detection

Mirai, Moobot, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Mirai
Yara detected Moobot
Yara detected Okiru
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428673
Start date and time:2024-04-19 11:42:31 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:qIEANK2huJ.elf
renamed because original name is a hash value
Original Sample Name:ea43929d4909e3e587276556a147b594.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@19/0
Command:/tmp/qIEANK2huJ.elf
PID:5489
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
qIEANK2huJ.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    qIEANK2huJ.elfJoeSecurity_MoobotYara detected MoobotJoe Security
      qIEANK2huJ.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        qIEANK2huJ.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0x18038:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1804c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18060:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18074:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18088:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1809c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x180b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x180c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x180d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x180ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18100:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18114:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18128:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1813c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18150:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18164:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x18178:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1818c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x181a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x181b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x181c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        qIEANK2huJ.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
        • 0xe820:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        5489.1.0000000000400000.000000000041b000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          5489.1.0000000000400000.000000000041b000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
            5489.1.0000000000400000.000000000041b000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
              5489.1.0000000000400000.000000000041b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0x18038:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1804c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18060:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18074:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18088:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1809c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x180b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x180c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x180d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x180ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18100:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18114:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18128:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1813c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18150:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18164:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x18178:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1818c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x181a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x181b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x181c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              5489.1.0000000000400000.000000000041b000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
              • 0xe820:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
              Click to see the 17 entries
              Timestamp:04/19/24-11:43:25.789821
              SID:2030490
              Source Port:33862
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:45:11.132803
              SID:2030490
              Source Port:33894
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:38.942356
              SID:2030490
              Source Port:33884
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:45:01.275253
              SID:2030490
              Source Port:33892
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:43:48.110552
              SID:2030490
              Source Port:33870
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:04.809232
              SID:2030490
              Source Port:33874
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:43:17.946698
              SID:2030490
              Source Port:33860
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:43:43.283441
              SID:2030490
              Source Port:33868
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:32.101241
              SID:2030490
              Source Port:33882
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:43:56.946679
              SID:2030490
              Source Port:33872
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:43:13.088628
              SID:2030490
              Source Port:33858
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:15.459459
              SID:2030490
              Source Port:33878
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:43:38.464567
              SID:2030490
              Source Port:33866
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:56.449396
              SID:2030490
              Source Port:33890
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:24.263485
              SID:2030490
              Source Port:33880
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:49.614793
              SID:2030490
              Source Port:33888
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:43:29.629925
              SID:2030490
              Source Port:33864
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:44.772695
              SID:2030490
              Source Port:33886
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:44:12.640433
              SID:2030490
              Source Port:33876
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: qIEANK2huJ.elfAvira: detected
              Source: qIEANK2huJ.elfVirustotal: Detection: 39%Perma Link
              Source: qIEANK2huJ.elfReversingLabs: Detection: 63%
              Source: qIEANK2huJ.elfJoe Sandbox ML: detected
              Source: qIEANK2huJ.elfString: HTTP/1.1 200 OKbulus.armbulus.arm5bulus.arm6bulus.arm7bulus.mipsbulus.mpslbulus.x86_64bulus.sh4abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZanko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-server/proc/%d/exe/tmp/%s%s%c/proc/self/cmdline/proc/%d/proc/self/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofia/var/Bulusshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/3f

              Networking

              barindex
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33858 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33860 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33862 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33864 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33866 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33868 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33870 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33872 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33874 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33876 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33878 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33880 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33882 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33884 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33886 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33888 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33890 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33892 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:33894 -> 103.174.73.85:29989
              Source: global trafficTCP traffic: 192.168.2.14:33858 -> 103.174.73.85:29989
              Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
              Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
              Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
              Source: unknownDNS traffic detected: queries for: proxy.heleh.vn
              Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443

              System Summary

              barindex
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
              Source: Process Memory Space: qIEANK2huJ.elf PID: 5489, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKbulus.armbulus.arm5bulus.arm6bulus.arm7bulus.mipsbulus.mpslbulus.x86_64bulus.sh4abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZanko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-server/proc/%d/exe/tmp/%s%s%c/proc/self/cmdline/proc/%d/proc/self/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofia/var/Bulusshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/3f
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
              Source: qIEANK2huJ.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
              Source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
              Source: Process Memory Space: qIEANK2huJ.elf PID: 5489, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/0@19/0
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/1583/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/2672/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/1577/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/1593/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/240/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/3094/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/242/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/3406/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/244/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/1589/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/245/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/3402/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/247/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/806/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/807/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/928/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/3420/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/135/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/1599/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/3412/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/3672/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/1371/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/262/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/142/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/263/cmdlineJump to behavior
              Source: /tmp/qIEANK2huJ.elf (PID: 5491)File opened: /proc/264/cmdlineJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: qIEANK2huJ.elf, type: SAMPLE
              Source: Yara matchFile source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qIEANK2huJ.elf PID: 5489, type: MEMORYSTR
              Source: Yara matchFile source: qIEANK2huJ.elf, type: SAMPLE
              Source: Yara matchFile source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qIEANK2huJ.elf PID: 5489, type: MEMORYSTR
              Source: Yara matchFile source: qIEANK2huJ.elf, type: SAMPLE
              Source: Yara matchFile source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qIEANK2huJ.elf PID: 5489, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: qIEANK2huJ.elf, type: SAMPLE
              Source: Yara matchFile source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qIEANK2huJ.elf PID: 5489, type: MEMORYSTR
              Source: Yara matchFile source: qIEANK2huJ.elf, type: SAMPLE
              Source: Yara matchFile source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qIEANK2huJ.elf PID: 5489, type: MEMORYSTR
              Source: Yara matchFile source: qIEANK2huJ.elf, type: SAMPLE
              Source: Yara matchFile source: 5489.1.0000000000400000.000000000041b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qIEANK2huJ.elf PID: 5489, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Scripting
              Path InterceptionDirect Volume Access1
              OS Credential Dumping
              System Service DiscoveryRemote ServicesData from Local System1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              qIEANK2huJ.elf39%VirustotalBrowse
              qIEANK2huJ.elf63%ReversingLabsLinux.Trojan.Mirai
              qIEANK2huJ.elf100%AviraEXP/ELF.Mirai.Z.A
              qIEANK2huJ.elf100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLink
              proxy.heleh.vn3%VirustotalBrowse
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              proxy.heleh.vn
              103.174.73.85
              truetrueunknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              103.174.73.85
              proxy.heleh.vnunknown
              7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNetrue
              185.125.190.26
              unknownUnited Kingdom
              41231CANONICAL-ASGBfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              103.174.73.85evYVOXt11H.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                BxEMaAYhqP.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                  9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                    bulus.arm7.elfGet hashmaliciousMiraiBrowse
                      bulus.arm5.elfGet hashmaliciousMiraiBrowse
                        bulus.arm.elfGet hashmaliciousMiraiBrowse
                          bulus.x86.elfGet hashmaliciousMiraiBrowse
                            185.125.190.26PN9QHDmpS1.elfGet hashmaliciousMirai, OkiruBrowse
                              eGjHpgUwlt.elfGet hashmaliciousMirai, OkiruBrowse
                                9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  vlxx.arm7-20240418-1854.elfGet hashmaliciousMirai, OkiruBrowse
                                    vlxx.x86_64-20240418-1853.elfGet hashmaliciousMirai, OkiruBrowse
                                      G9J8ic1utC.elfGet hashmaliciousUnknownBrowse
                                        Ja84Oghm6q.elfGet hashmaliciousMirai, OkiruBrowse
                                          QpHMHEg6OQ.elfGet hashmaliciousChaosBrowse
                                            c1N1s54Xz4.elfGet hashmaliciousMirai, OkiruBrowse
                                              sNUnKpshtR.elfGet hashmaliciousMirai, OkiruBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                proxy.heleh.vnevYVOXt11H.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                • 103.174.73.85
                                                BxEMaAYhqP.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                • 103.174.73.85
                                                9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                • 103.174.73.85
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CANONICAL-ASGBFZqYclxRiu.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 91.189.91.42
                                                PN9QHDmpS1.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 185.125.190.26
                                                eGjHpgUwlt.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 185.125.190.26
                                                qlt52dfogC.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 91.189.91.42
                                                9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                • 185.125.190.26
                                                46t2vW6nO9.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 91.189.91.42
                                                l1uxT537eS.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                4wngRroxli.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                XioVUcbE3G.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                85x5rW00VC.elfGet hashmaliciousGafgytBrowse
                                                • 91.189.91.42
                                                AARNET-AS-APAustralianAcademicandResearchNetworkAARNeevYVOXt11H.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                • 103.174.73.85
                                                BxEMaAYhqP.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                • 103.174.73.85
                                                9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                • 103.174.73.85
                                                BzmhHwFpCV.elfGet hashmaliciousMiraiBrowse
                                                • 103.189.218.40
                                                Gq7FlDf6cE.elfGet hashmaliciousMiraiBrowse
                                                • 103.183.144.21
                                                XY2I8rWLkM.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 103.186.117.171
                                                2020.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 103.186.117.171
                                                Ja84Oghm6q.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 103.167.88.226
                                                eHFldFkJF4.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 103.167.88.226
                                                No context
                                                No context
                                                No created / dropped files found
                                                File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                                Entropy (8bit):5.2927805502529655
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:qIEANK2huJ.elf
                                                File size:146'904 bytes
                                                MD5:ea43929d4909e3e587276556a147b594
                                                SHA1:4d6282015ca7a645c01571f9c8d8456a2f50fc23
                                                SHA256:51ec23564f60188b7a2d834d6a3438bbd104e6ebc931036fa70013be854b46ee
                                                SHA512:6b31f5dbe1371bdb9850bb82dfb36f75707a77b0fc8afdf9dbad16e0b004c9d717876715c04b57ee5d46464d0c50a9dc12880ef2eb59f8b1226f51b9ea459bb6
                                                SSDEEP:3072:rJaDjzXRdr5Hy2Y0hXWotW7t9IvYmdQV+eFvCd7zfHOUWxub:rJaDjzXRddueULvCBOub
                                                TLSH:51E33A07B5C184FDC4DAC1B44B9BF53ADD31F0981238F26B27C8AA261E8EE215F5DA54
                                                File Content Preview:.ELF..............>.......@.....@.......X;..........@.8...@.......................@.......@...............................................Q.......Q.....p.......................Q.td....................................................H...._.....y..H........

                                                ELF header

                                                Class:ELF64
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:Advanced Micro Devices X86-64
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x400194
                                                Flags:0x0
                                                ELF Header Size:64
                                                Program Header Offset:64
                                                Program Header Size:56
                                                Number of Program Headers:3
                                                Section Header Offset:146264
                                                Section Header Size:64
                                                Number of Section Headers:10
                                                Header String Table Index:9
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .initPROGBITS0x4000e80xe80x130x00x6AX001
                                                .textPROGBITS0x4001000x1000x179e60x00x6AX0016
                                                .finiPROGBITS0x417ae60x17ae60xe0x00x6AX001
                                                .rodataPROGBITS0x417b000x17b000x31a00x00x2A0032
                                                .ctorsPROGBITS0x51aca80x1aca80x180x00x3WA008
                                                .dtorsPROGBITS0x51acc00x1acc00x100x00x3WA008
                                                .dataPROGBITS0x51ace00x1ace00x8e380x00x3WA0032
                                                .bssNOBITS0x523b200x23b180x72a00x00x3WA0032
                                                .shstrtabSTRTAB0x00x23b180x3e0x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x4000000x4000000x1aca00x1aca06.39580x5R E0x100000.init .text .fini .rodata
                                                LOAD0x1aca80x51aca80x51aca80x8e700x101180.22850x6RW 0x100000.ctors .dtors .data .bss
                                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                04/19/24-11:43:25.789821TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3386229989192.168.2.14103.174.73.85
                                                04/19/24-11:45:11.132803TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3389429989192.168.2.14103.174.73.85
                                                04/19/24-11:44:38.942356TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3388429989192.168.2.14103.174.73.85
                                                04/19/24-11:45:01.275253TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3389229989192.168.2.14103.174.73.85
                                                04/19/24-11:43:48.110552TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3387029989192.168.2.14103.174.73.85
                                                04/19/24-11:44:04.809232TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3387429989192.168.2.14103.174.73.85
                                                04/19/24-11:43:17.946698TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3386029989192.168.2.14103.174.73.85
                                                04/19/24-11:43:43.283441TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3386829989192.168.2.14103.174.73.85
                                                04/19/24-11:44:32.101241TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3388229989192.168.2.14103.174.73.85
                                                04/19/24-11:43:56.946679TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3387229989192.168.2.14103.174.73.85
                                                04/19/24-11:43:13.088628TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3385829989192.168.2.14103.174.73.85
                                                04/19/24-11:44:15.459459TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3387829989192.168.2.14103.174.73.85
                                                04/19/24-11:43:38.464567TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3386629989192.168.2.14103.174.73.85
                                                04/19/24-11:44:56.449396TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3389029989192.168.2.14103.174.73.85
                                                04/19/24-11:44:24.263485TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3388029989192.168.2.14103.174.73.85
                                                04/19/24-11:44:49.614793TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3388829989192.168.2.14103.174.73.85
                                                04/19/24-11:43:29.629925TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3386429989192.168.2.14103.174.73.85
                                                04/19/24-11:44:44.772695TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3388629989192.168.2.14103.174.73.85
                                                04/19/24-11:44:12.640433TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)3387629989192.168.2.14103.174.73.85
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 19, 2024 11:43:12.724200010 CEST3385829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:13.088493109 CEST2998933858103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:13.088555098 CEST3385829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:13.088628054 CEST3385829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:13.453591108 CEST2998933858103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:13.453619957 CEST2998933858103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:13.453701019 CEST3385829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:13.821602106 CEST2998933858103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:17.559082031 CEST3386029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:17.946537971 CEST2998933860103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:17.946697950 CEST3386029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:17.946697950 CEST3386029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:18.327483892 CEST2998933860103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:18.327539921 CEST2998933860103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:18.327660084 CEST3386029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:18.709070921 CEST2998933860103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:21.244667053 CEST46540443192.168.2.14185.125.190.26
                                                Apr 19, 2024 11:43:25.432941914 CEST3386229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:25.789611101 CEST2998933862103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:25.789732933 CEST3386229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:25.789820910 CEST3386229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:26.146998882 CEST2998933862103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:26.147067070 CEST2998933862103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:26.147178888 CEST3386229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:26.504025936 CEST2998933862103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:29.252522945 CEST3386429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:29.629554987 CEST2998933864103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:29.629720926 CEST3386429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:29.629925013 CEST3386429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:30.006874084 CEST2998933864103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:30.006900072 CEST2998933864103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:38.112827063 CEST3386629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:38.464241028 CEST2998933866103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:38.464483023 CEST3386629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:38.464566946 CEST3386629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:38.816557884 CEST2998933866103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:38.816623926 CEST2998933866103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:38.816905975 CEST3386629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:39.168215990 CEST2998933866103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:42.922288895 CEST3386829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:43.283204079 CEST2998933868103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:43.283363104 CEST3386829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:43.283441067 CEST3386829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:43.644448042 CEST2998933868103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:43.644642115 CEST3386829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:43.645654917 CEST2998933868103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:44.007049084 CEST2998933868103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:47.750577927 CEST3387029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:48.110322952 CEST2998933870103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:48.110501051 CEST3387029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:48.110552073 CEST3387029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:48.471185923 CEST2998933870103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:48.471218109 CEST2998933870103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:48.471369028 CEST3387029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:48.831150055 CEST2998933870103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:52.219463110 CEST46540443192.168.2.14185.125.190.26
                                                Apr 19, 2024 11:43:56.576366901 CEST3387229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:56.946508884 CEST2998933872103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:56.946640015 CEST3387229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:56.946679115 CEST3387229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:57.317478895 CEST2998933872103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:57.317572117 CEST2998933872103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:43:57.317725897 CEST3387229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:43:57.687920094 CEST2998933872103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:03.423755884 CEST3387429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:04.443001032 CEST3387429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:04.808965921 CEST2998933874103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:04.809143066 CEST3387429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:04.809231997 CEST3387429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:05.173723936 CEST2998933874103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:05.173887968 CEST2998933874103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:05.174062014 CEST3387429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:05.538703918 CEST2998933874103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:12.279362917 CEST3387629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:12.640183926 CEST2998933876103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:12.640433073 CEST3387629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:12.640433073 CEST3387629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:12.999819040 CEST2998933876103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:12.999862909 CEST2998933876103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:13.000149012 CEST3387629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:13.358267069 CEST2998933876103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:15.105397940 CEST3387829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:15.459202051 CEST2998933878103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:15.459388018 CEST3387829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:15.459459066 CEST3387829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:15.812536001 CEST2998933878103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:15.812587976 CEST2998933878103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:15.812752962 CEST3387829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:16.166337013 CEST2998933878103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:23.918390036 CEST3388029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:24.263173103 CEST2998933880103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:24.263386011 CEST3388029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:24.263484955 CEST3388029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:24.607346058 CEST2998933880103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:24.608362913 CEST2998933880103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:24.608607054 CEST3388029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:24.950685978 CEST2998933880103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:30.713773012 CEST3388229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:31.738009930 CEST3388229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:32.100961924 CEST2998933882103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:32.101095915 CEST3388229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:32.101241112 CEST3388229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:32.108963966 CEST2998933882103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:32.109035015 CEST3388229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:32.472320080 CEST2998933882103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:32.472363949 CEST2998933882103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:32.472547054 CEST3388229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:32.843615055 CEST2998933882103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:38.577933073 CEST3388429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:38.942030907 CEST2998933884103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:38.942289114 CEST3388429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:38.942356110 CEST3388429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:39.307466984 CEST2998933884103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:39.307501078 CEST2998933884103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:39.307670116 CEST3388429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:39.671627045 CEST2998933884103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:44.413073063 CEST3388629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:44.772452116 CEST2998933886103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:44.772607088 CEST3388629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:44.772695065 CEST3388629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:45.132818937 CEST2998933886103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:45.132879019 CEST2998933886103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:45.133040905 CEST3388629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:46.073496103 CEST3388629989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:46.433670044 CEST2998933886103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:49.238615990 CEST3388829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:49.614434004 CEST2998933888103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:49.614793062 CEST3388829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:49.614793062 CEST3388829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:49.990971088 CEST2998933888103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:49.991179943 CEST2998933888103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:49.991451025 CEST3388829989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:50.366899967 CEST2998933888103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:56.096395969 CEST3389029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:56.449105024 CEST2998933890103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:56.449320078 CEST3389029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:56.449395895 CEST3389029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:56.802879095 CEST2998933890103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:56.802948952 CEST2998933890103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:44:56.803164959 CEST3389029989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:44:57.156075001 CEST2998933890103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:45:00.912048101 CEST3389229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:45:01.274947882 CEST2998933892103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:45:01.275120974 CEST3389229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:45:01.275253057 CEST3389229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:45:01.637595892 CEST2998933892103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:45:01.637665987 CEST2998933892103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:45:01.637789011 CEST3389229989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:45:01.999730110 CEST2998933892103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:45:10.742659092 CEST3389429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:45:11.132606030 CEST2998933894103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:45:11.132802963 CEST3389429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:45:11.132802963 CEST3389429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:45:11.522138119 CEST2998933894103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:45:11.522177935 CEST2998933894103.174.73.85192.168.2.14
                                                Apr 19, 2024 11:45:11.522417068 CEST3389429989192.168.2.14103.174.73.85
                                                Apr 19, 2024 11:45:11.912370920 CEST2998933894103.174.73.85192.168.2.14
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 19, 2024 11:43:12.618792057 CEST4578853192.168.2.148.8.8.8
                                                Apr 19, 2024 11:43:12.723866940 CEST53457888.8.8.8192.168.2.14
                                                Apr 19, 2024 11:43:17.453682899 CEST4312853192.168.2.148.8.8.8
                                                Apr 19, 2024 11:43:17.558814049 CEST53431288.8.8.8192.168.2.14
                                                Apr 19, 2024 11:43:25.327558994 CEST3682353192.168.2.148.8.8.8
                                                Apr 19, 2024 11:43:25.432802916 CEST53368238.8.8.8192.168.2.14
                                                Apr 19, 2024 11:43:29.147330046 CEST4450153192.168.2.148.8.8.8
                                                Apr 19, 2024 11:43:29.252336025 CEST53445018.8.8.8192.168.2.14
                                                Apr 19, 2024 11:43:38.007075071 CEST3996153192.168.2.148.8.8.8
                                                Apr 19, 2024 11:43:38.112550974 CEST53399618.8.8.8192.168.2.14
                                                Apr 19, 2024 11:43:42.816909075 CEST3379353192.168.2.148.8.8.8
                                                Apr 19, 2024 11:43:42.922005892 CEST53337938.8.8.8192.168.2.14
                                                Apr 19, 2024 11:43:47.644846916 CEST5507253192.168.2.148.8.8.8
                                                Apr 19, 2024 11:43:47.750328064 CEST53550728.8.8.8192.168.2.14
                                                Apr 19, 2024 11:43:56.471287966 CEST4706253192.168.2.148.8.8.8
                                                Apr 19, 2024 11:43:56.576196909 CEST53470628.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:03.317712069 CEST4229853192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:03.423546076 CEST53422988.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:12.174050093 CEST3992953192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:12.279026985 CEST53399298.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:15.000186920 CEST4366453192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:15.105170012 CEST53436648.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:23.812866926 CEST5810453192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:23.918045998 CEST53581048.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:30.608407974 CEST5408553192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:30.713524103 CEST53540858.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:38.472518921 CEST5689553192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:38.577632904 CEST53568958.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:44.307732105 CEST4539353192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:44.412899017 CEST53453938.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:49.133162022 CEST5967653192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:49.238435030 CEST53596768.8.8.8192.168.2.14
                                                Apr 19, 2024 11:44:55.991396904 CEST6001653192.168.2.148.8.8.8
                                                Apr 19, 2024 11:44:56.096182108 CEST53600168.8.8.8192.168.2.14
                                                Apr 19, 2024 11:45:00.803287029 CEST5613153192.168.2.148.8.8.8
                                                Apr 19, 2024 11:45:00.911747932 CEST53561318.8.8.8192.168.2.14
                                                Apr 19, 2024 11:45:10.637712002 CEST4477753192.168.2.148.8.8.8
                                                Apr 19, 2024 11:45:10.742415905 CEST53447778.8.8.8192.168.2.14
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 19, 2024 11:43:12.618792057 CEST192.168.2.148.8.8.80x98fbStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:17.453682899 CEST192.168.2.148.8.8.80xcf04Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:25.327558994 CEST192.168.2.148.8.8.80x91bdStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:29.147330046 CEST192.168.2.148.8.8.80x2d28Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:38.007075071 CEST192.168.2.148.8.8.80x74b7Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:42.816909075 CEST192.168.2.148.8.8.80x27c7Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:47.644846916 CEST192.168.2.148.8.8.80x1193Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:56.471287966 CEST192.168.2.148.8.8.80xb567Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:03.317712069 CEST192.168.2.148.8.8.80x313cStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:12.174050093 CEST192.168.2.148.8.8.80x27ccStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:15.000186920 CEST192.168.2.148.8.8.80x1a0fStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:23.812866926 CEST192.168.2.148.8.8.80xf98cStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:30.608407974 CEST192.168.2.148.8.8.80xb8eaStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:38.472518921 CEST192.168.2.148.8.8.80xccddStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:44.307732105 CEST192.168.2.148.8.8.80x9d1bStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:49.133162022 CEST192.168.2.148.8.8.80x83e2Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:55.991396904 CEST192.168.2.148.8.8.80xe551Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:45:00.803287029 CEST192.168.2.148.8.8.80xfddcStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:45:10.637712002 CEST192.168.2.148.8.8.80xff08Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 19, 2024 11:43:12.723866940 CEST8.8.8.8192.168.2.140x98fbNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:17.558814049 CEST8.8.8.8192.168.2.140xcf04No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:25.432802916 CEST8.8.8.8192.168.2.140x91bdNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:29.252336025 CEST8.8.8.8192.168.2.140x2d28No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:38.112550974 CEST8.8.8.8192.168.2.140x74b7No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:42.922005892 CEST8.8.8.8192.168.2.140x27c7No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:47.750328064 CEST8.8.8.8192.168.2.140x1193No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:43:56.576196909 CEST8.8.8.8192.168.2.140xb567No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:03.423546076 CEST8.8.8.8192.168.2.140x313cNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:12.279026985 CEST8.8.8.8192.168.2.140x27ccNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:15.105170012 CEST8.8.8.8192.168.2.140x1a0fNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:23.918045998 CEST8.8.8.8192.168.2.140xf98cNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:30.713524103 CEST8.8.8.8192.168.2.140xb8eaNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:38.577632904 CEST8.8.8.8192.168.2.140xccddNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:44.412899017 CEST8.8.8.8192.168.2.140x9d1bNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:49.238435030 CEST8.8.8.8192.168.2.140x83e2No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:44:56.096182108 CEST8.8.8.8192.168.2.140xe551No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:45:00.911747932 CEST8.8.8.8192.168.2.140xfddcNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                                Apr 19, 2024 11:45:10.742415905 CEST8.8.8.8192.168.2.140xff08No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false

                                                System Behavior

                                                Start time (UTC):09:43:11
                                                Start date (UTC):19/04/2024
                                                Path:/tmp/qIEANK2huJ.elf
                                                Arguments:/tmp/qIEANK2huJ.elf
                                                File size:146904 bytes
                                                MD5 hash:ea43929d4909e3e587276556a147b594

                                                Start time (UTC):09:43:11
                                                Start date (UTC):19/04/2024
                                                Path:/tmp/qIEANK2huJ.elf
                                                Arguments:-
                                                File size:146904 bytes
                                                MD5 hash:ea43929d4909e3e587276556a147b594

                                                Start time (UTC):09:43:11
                                                Start date (UTC):19/04/2024
                                                Path:/tmp/qIEANK2huJ.elf
                                                Arguments:-
                                                File size:146904 bytes
                                                MD5 hash:ea43929d4909e3e587276556a147b594